Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2024-26598 (GCVE-0-2024-26598)
Vulnerability from cvelistv5 – Published: 2024-02-23 14:46 – Updated: 2025-12-20 08:51- CWE-416 - Use After Free
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| Linux | Linux |
Affected:
6211753fdfd05af9e08f54c8d0ba3ee516034878 , < d04acadb6490aa3314f9c9e087691e55de153b88
(git)
Affected: 6211753fdfd05af9e08f54c8d0ba3ee516034878 , < ba7be666740847d967822bed15500656b26bc703 (git) Affected: 6211753fdfd05af9e08f54c8d0ba3ee516034878 , < 12c2759ab1343c124ed46ba48f27bd1ef5d2dff4 (git) Affected: 6211753fdfd05af9e08f54c8d0ba3ee516034878 , < dba788e25f05209adf2b0175eb1691dc89fb1ba6 (git) Affected: 6211753fdfd05af9e08f54c8d0ba3ee516034878 , < 65b201bf3e9af1b0254243a5881390eda56f72d1 (git) Affected: 6211753fdfd05af9e08f54c8d0ba3ee516034878 , < dd3956a1b3dd11f46488c928cb890d6937d1ca80 (git) Affected: 6211753fdfd05af9e08f54c8d0ba3ee516034878 , < ad362fe07fecf0aba839ff2cc59a3617bd42c33f (git) |
|||||||
|
|||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T00:07:19.689Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://git.kernel.org/stable/c/d04acadb6490aa3314f9c9e087691e55de153b88"
},
{
"tags": [
"x_transferred"
],
"url": "https://git.kernel.org/stable/c/ba7be666740847d967822bed15500656b26bc703"
},
{
"tags": [
"x_transferred"
],
"url": "https://git.kernel.org/stable/c/12c2759ab1343c124ed46ba48f27bd1ef5d2dff4"
},
{
"tags": [
"x_transferred"
],
"url": "https://git.kernel.org/stable/c/dba788e25f05209adf2b0175eb1691dc89fb1ba6"
},
{
"tags": [
"x_transferred"
],
"url": "https://git.kernel.org/stable/c/65b201bf3e9af1b0254243a5881390eda56f72d1"
},
{
"tags": [
"x_transferred"
],
"url": "https://git.kernel.org/stable/c/dd3956a1b3dd11f46488c928cb890d6937d1ca80"
},
{
"tags": [
"x_transferred"
],
"url": "https://git.kernel.org/stable/c/ad362fe07fecf0aba839ff2cc59a3617bd42c33f"
},
{
"tags": [
"x_transferred"
],
"url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html"
}
],
"title": "CVE Program Container"
},
{
"affected": [
{
"cpes": [
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "linux_kernel",
"vendor": "linux",
"versions": [
{
"lessThan": "d04acadb6490",
"status": "affected",
"version": "1da177e4c3f4",
"versionType": "custom"
},
{
"lessThan": "ba7be6667408",
"status": "affected",
"version": "1da177e4c3f4",
"versionType": "custom"
},
{
"lessThan": "12c2759ab134",
"status": "affected",
"version": "1da177e4c3f4",
"versionType": "custom"
},
{
"lessThan": "dba788e25f05",
"status": "affected",
"version": "1da177e4c3f4",
"versionType": "custom"
},
{
"lessThan": "65b201bf3e9a",
"status": "affected",
"version": "1da177e4c3f4",
"versionType": "custom"
},
{
"lessThan": "dd3956a1b3dd",
"status": "affected",
"version": "1da177e4c3f4",
"versionType": "custom"
},
{
"lessThan": "ad362fe07fec",
"status": "affected",
"version": "1da177e4c3f4",
"versionType": "custom"
},
{
"lessThanOrEqual": "5.5",
"status": "unaffected",
"version": "5.4.269",
"versionType": "custom"
},
{
"lessThanOrEqual": "5.11",
"status": "unaffected",
"version": "5.10.209",
"versionType": "custom"
},
{
"lessThanOrEqual": "5.16",
"status": "unaffected",
"version": "5.15.148",
"versionType": "custom"
},
{
"lessThanOrEqual": "6.2",
"status": "unaffected",
"version": "6.1.75",
"versionType": "custom"
},
{
"lessThanOrEqual": "6.7",
"status": "unaffected",
"version": "6.6.14",
"versionType": "custom"
},
{
"lessThanOrEqual": "6.8",
"status": "unaffected",
"version": "6.7.2",
"versionType": "custom"
},
{
"lessThanOrEqual": "*",
"status": "unaffected",
"version": "6.8",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2024-26598",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-04-22T16:15:47.782832Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-416",
"description": "CWE-416 Use After Free",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-04-22T16:16:01.155Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Linux",
"programFiles": [
"arch/arm64/kvm/vgic/vgic-its.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"lessThan": "d04acadb6490aa3314f9c9e087691e55de153b88",
"status": "affected",
"version": "6211753fdfd05af9e08f54c8d0ba3ee516034878",
"versionType": "git"
},
{
"lessThan": "ba7be666740847d967822bed15500656b26bc703",
"status": "affected",
"version": "6211753fdfd05af9e08f54c8d0ba3ee516034878",
"versionType": "git"
},
{
"lessThan": "12c2759ab1343c124ed46ba48f27bd1ef5d2dff4",
"status": "affected",
"version": "6211753fdfd05af9e08f54c8d0ba3ee516034878",
"versionType": "git"
},
{
"lessThan": "dba788e25f05209adf2b0175eb1691dc89fb1ba6",
"status": "affected",
"version": "6211753fdfd05af9e08f54c8d0ba3ee516034878",
"versionType": "git"
},
{
"lessThan": "65b201bf3e9af1b0254243a5881390eda56f72d1",
"status": "affected",
"version": "6211753fdfd05af9e08f54c8d0ba3ee516034878",
"versionType": "git"
},
{
"lessThan": "dd3956a1b3dd11f46488c928cb890d6937d1ca80",
"status": "affected",
"version": "6211753fdfd05af9e08f54c8d0ba3ee516034878",
"versionType": "git"
},
{
"lessThan": "ad362fe07fecf0aba839ff2cc59a3617bd42c33f",
"status": "affected",
"version": "6211753fdfd05af9e08f54c8d0ba3ee516034878",
"versionType": "git"
}
]
},
{
"defaultStatus": "affected",
"product": "Linux",
"programFiles": [
"arch/arm64/kvm/vgic/vgic-its.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"status": "affected",
"version": "3.11"
},
{
"lessThan": "3.11",
"status": "unaffected",
"version": "0",
"versionType": "semver"
},
{
"lessThanOrEqual": "5.4.*",
"status": "unaffected",
"version": "5.4.269",
"versionType": "semver"
},
{
"lessThanOrEqual": "5.10.*",
"status": "unaffected",
"version": "5.10.209",
"versionType": "semver"
},
{
"lessThanOrEqual": "5.15.*",
"status": "unaffected",
"version": "5.15.148",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.1.*",
"status": "unaffected",
"version": "6.1.75",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.6.*",
"status": "unaffected",
"version": "6.6.14",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.7.*",
"status": "unaffected",
"version": "6.7.2",
"versionType": "semver"
},
{
"lessThanOrEqual": "*",
"status": "unaffected",
"version": "6.8",
"versionType": "original_commit_for_fix"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.4.269",
"versionStartIncluding": "3.11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.10.209",
"versionStartIncluding": "3.11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.15.148",
"versionStartIncluding": "3.11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.1.75",
"versionStartIncluding": "3.11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.6.14",
"versionStartIncluding": "3.11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.7.2",
"versionStartIncluding": "3.11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.8",
"versionStartIncluding": "3.11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache\n\nThere is a potential UAF scenario in the case of an LPI translation\ncache hit racing with an operation that invalidates the cache, such\nas a DISCARD ITS command. The root of the problem is that\nvgic_its_check_cache() does not elevate the refcount on the vgic_irq\nbefore dropping the lock that serializes refcount changes.\n\nHave vgic_its_check_cache() raise the refcount on the returned vgic_irq\nand add the corresponding decrement after queueing the interrupt."
}
],
"providerMetadata": {
"dateUpdated": "2025-12-20T08:51:31.873Z",
"orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"shortName": "Linux"
},
"references": [
{
"url": "https://git.kernel.org/stable/c/d04acadb6490aa3314f9c9e087691e55de153b88"
},
{
"url": "https://git.kernel.org/stable/c/ba7be666740847d967822bed15500656b26bc703"
},
{
"url": "https://git.kernel.org/stable/c/12c2759ab1343c124ed46ba48f27bd1ef5d2dff4"
},
{
"url": "https://git.kernel.org/stable/c/dba788e25f05209adf2b0175eb1691dc89fb1ba6"
},
{
"url": "https://git.kernel.org/stable/c/65b201bf3e9af1b0254243a5881390eda56f72d1"
},
{
"url": "https://git.kernel.org/stable/c/dd3956a1b3dd11f46488c928cb890d6937d1ca80"
},
{
"url": "https://git.kernel.org/stable/c/ad362fe07fecf0aba839ff2cc59a3617bd42c33f"
}
],
"title": "KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache",
"x_generator": {
"engine": "bippy-1.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"assignerShortName": "Linux",
"cveId": "CVE-2024-26598",
"datePublished": "2024-02-23T14:46:26.672Z",
"dateReserved": "2024-02-19T14:20:24.128Z",
"dateUpdated": "2025-12-20T08:51:31.873Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"5.4\", \"versionEndExcluding\": \"5.4.269\", \"matchCriteriaId\": \"E2B90340-A8CC-4956-9F40-F37195011EC7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"5.5\", \"versionEndExcluding\": \"5.10.209\", \"matchCriteriaId\": \"74979A03-4B10-4815-AE3E-C8C0D2FDAA39\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"5.11\", \"versionEndExcluding\": \"5.15.148\", \"matchCriteriaId\": \"2ED0CDB9-61B0-408E-B2A8-5199107F7868\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"5.16\", \"versionEndExcluding\": \"6.1.75\", \"matchCriteriaId\": \"070D0ED3-90D0-4F95-B1FF-57D7F46F332D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"6.2\", \"versionEndExcluding\": \"6.6.14\", \"matchCriteriaId\": \"5C6B50A6-3D8B-4CE2-BDCC-A098609CBA14\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"6.7\", \"versionEndExcluding\": \"6.7.2\", \"matchCriteriaId\": \"7229C448-E0C9-488B-8939-36BA5254065E\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"07B237A9-69A3-4A9C-9DA0-4E06BD37AE73\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\nKVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache\\n\\nThere is a potential UAF scenario in the case of an LPI translation\\ncache hit racing with an operation that invalidates the cache, such\\nas a DISCARD ITS command. The root of the problem is that\\nvgic_its_check_cache() does not elevate the refcount on the vgic_irq\\nbefore dropping the lock that serializes refcount changes.\\n\\nHave vgic_its_check_cache() raise the refcount on the returned vgic_irq\\nand add the corresponding decrement after queueing the interrupt.\"}, {\"lang\": \"es\", \"value\": \"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: KVM: arm64: vgic-its: Evite posibles UAF en la cach\\u00e9 de traducci\\u00f3n LPI. Existe un escenario potencial de UAF en el caso de que un cach\\u00e9 de traducci\\u00f3n LPI se acelere con una operaci\\u00f3n que invalide la cach\\u00e9, como un comando DISCARD ITS. La ra\\u00edz del problema es que vgic_its_check_cache() no eleva el refcount en vgic_irq antes de eliminar el bloqueo que serializa los cambios de refcount. Haga que vgic_its_check_cache() aumente el refcount en el vgic_irq devuelto y agregue el decremento correspondiente despu\\u00e9s de poner en cola la interrupci\\u00f3n.\"}]",
"id": "CVE-2024-26598",
"lastModified": "2024-11-21T09:02:37.617",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 7.8, \"baseSeverity\": \"HIGH\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.8, \"impactScore\": 5.9}, {\"source\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 7.8, \"baseSeverity\": \"HIGH\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.8, \"impactScore\": 5.9}]}",
"published": "2024-02-23T15:15:09.610",
"references": "[{\"url\": \"https://git.kernel.org/stable/c/12c2759ab1343c124ed46ba48f27bd1ef5d2dff4\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"tags\": [\"Patch\"]}, {\"url\": \"https://git.kernel.org/stable/c/65b201bf3e9af1b0254243a5881390eda56f72d1\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"tags\": [\"Patch\"]}, {\"url\": \"https://git.kernel.org/stable/c/ad362fe07fecf0aba839ff2cc59a3617bd42c33f\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"tags\": [\"Patch\"]}, {\"url\": \"https://git.kernel.org/stable/c/ba7be666740847d967822bed15500656b26bc703\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"tags\": [\"Patch\"]}, {\"url\": \"https://git.kernel.org/stable/c/d04acadb6490aa3314f9c9e087691e55de153b88\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"tags\": [\"Patch\"]}, {\"url\": \"https://git.kernel.org/stable/c/dba788e25f05209adf2b0175eb1691dc89fb1ba6\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"tags\": [\"Patch\"]}, {\"url\": \"https://git.kernel.org/stable/c/dd3956a1b3dd11f46488c928cb890d6937d1ca80\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"tags\": [\"Patch\"]}, {\"url\": \"https://git.kernel.org/stable/c/12c2759ab1343c124ed46ba48f27bd1ef5d2dff4\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"https://git.kernel.org/stable/c/65b201bf3e9af1b0254243a5881390eda56f72d1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"https://git.kernel.org/stable/c/ad362fe07fecf0aba839ff2cc59a3617bd42c33f\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"https://git.kernel.org/stable/c/ba7be666740847d967822bed15500656b26bc703\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"https://git.kernel.org/stable/c/d04acadb6490aa3314f9c9e087691e55de153b88\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"https://git.kernel.org/stable/c/dba788e25f05209adf2b0175eb1691dc89fb1ba6\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"https://git.kernel.org/stable/c/dd3956a1b3dd11f46488c928cb890d6937d1ca80\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-416\"}]}, {\"source\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-416\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2024-26598\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-02-23T15:15:09.610\",\"lastModified\":\"2024-11-21T09:02:37.617\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nKVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache\\n\\nThere is a potential UAF scenario in the case of an LPI translation\\ncache hit racing with an operation that invalidates the cache, such\\nas a DISCARD ITS command. The root of the problem is that\\nvgic_its_check_cache() does not elevate the refcount on the vgic_irq\\nbefore dropping the lock that serializes refcount changes.\\n\\nHave vgic_its_check_cache() raise the refcount on the returned vgic_irq\\nand add the corresponding decrement after queueing the interrupt.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: KVM: arm64: vgic-its: Evite posibles UAF en la cach\u00e9 de traducci\u00f3n LPI. Existe un escenario potencial de UAF en el caso de que un cach\u00e9 de traducci\u00f3n LPI se acelere con una operaci\u00f3n que invalide la cach\u00e9, como un comando DISCARD ITS. La ra\u00edz del problema es que vgic_its_check_cache() no eleva el refcount en vgic_irq antes de eliminar el bloqueo que serializa los cambios de refcount. Haga que vgic_its_check_cache() aumente el refcount en el vgic_irq devuelto y agregue el decremento correspondiente despu\u00e9s de poner en cola la interrupci\u00f3n.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-416\"}]},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-416\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.4\",\"versionEndExcluding\":\"5.4.269\",\"matchCriteriaId\":\"E2B90340-A8CC-4956-9F40-F37195011EC7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.5\",\"versionEndExcluding\":\"5.10.209\",\"matchCriteriaId\":\"74979A03-4B10-4815-AE3E-C8C0D2FDAA39\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.11\",\"versionEndExcluding\":\"5.15.148\",\"matchCriteriaId\":\"2ED0CDB9-61B0-408E-B2A8-5199107F7868\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.16\",\"versionEndExcluding\":\"6.1.75\",\"matchCriteriaId\":\"070D0ED3-90D0-4F95-B1FF-57D7F46F332D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.2\",\"versionEndExcluding\":\"6.6.14\",\"matchCriteriaId\":\"5C6B50A6-3D8B-4CE2-BDCC-A098609CBA14\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.7\",\"versionEndExcluding\":\"6.7.2\",\"matchCriteriaId\":\"7229C448-E0C9-488B-8939-36BA5254065E\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07B237A9-69A3-4A9C-9DA0-4E06BD37AE73\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/12c2759ab1343c124ed46ba48f27bd1ef5d2dff4\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/65b201bf3e9af1b0254243a5881390eda56f72d1\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/ad362fe07fecf0aba839ff2cc59a3617bd42c33f\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/ba7be666740847d967822bed15500656b26bc703\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/d04acadb6490aa3314f9c9e087691e55de153b88\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/dba788e25f05209adf2b0175eb1691dc89fb1ba6\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/dd3956a1b3dd11f46488c928cb890d6937d1ca80\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/12c2759ab1343c124ed46ba48f27bd1ef5d2dff4\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/65b201bf3e9af1b0254243a5881390eda56f72d1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/ad362fe07fecf0aba839ff2cc59a3617bd42c33f\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/ba7be666740847d967822bed15500656b26bc703\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/d04acadb6490aa3314f9c9e087691e55de153b88\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/dba788e25f05209adf2b0175eb1691dc89fb1ba6\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/dd3956a1b3dd11f46488c928cb890d6937d1ca80\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://git.kernel.org/stable/c/d04acadb6490aa3314f9c9e087691e55de153b88\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/ba7be666740847d967822bed15500656b26bc703\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/12c2759ab1343c124ed46ba48f27bd1ef5d2dff4\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/dba788e25f05209adf2b0175eb1691dc89fb1ba6\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/65b201bf3e9af1b0254243a5881390eda56f72d1\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/dd3956a1b3dd11f46488c928cb890d6937d1ca80\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/ad362fe07fecf0aba839ff2cc59a3617bd42c33f\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T00:07:19.689Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.8, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"HIGH\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-26598\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-04-22T16:15:47.782832Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*\"], \"vendor\": \"linux\", \"product\": \"linux_kernel\", \"versions\": [{\"status\": \"affected\", \"version\": \"1da177e4c3f4\", \"lessThan\": \"d04acadb6490\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"1da177e4c3f4\", \"lessThan\": \"ba7be6667408\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"1da177e4c3f4\", \"lessThan\": \"12c2759ab134\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"1da177e4c3f4\", \"lessThan\": \"dba788e25f05\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"1da177e4c3f4\", \"lessThan\": \"65b201bf3e9a\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"1da177e4c3f4\", \"lessThan\": \"dd3956a1b3dd\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"1da177e4c3f4\", \"lessThan\": \"ad362fe07fec\", \"versionType\": \"custom\"}, {\"status\": \"unaffected\", \"version\": \"5.4.269\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"5.5\"}, {\"status\": \"unaffected\", \"version\": \"5.10.209\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"5.11\"}, {\"status\": \"unaffected\", \"version\": \"5.15.148\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"5.16\"}, {\"status\": \"unaffected\", \"version\": \"6.1.75\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"6.2\"}, {\"status\": \"unaffected\", \"version\": \"6.6.14\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"6.7\"}, {\"status\": \"unaffected\", \"version\": \"6.7.2\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"6.8\"}, {\"status\": \"unaffected\", \"version\": \"6.8\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"*\"}], \"defaultStatus\": \"unknown\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-416\", \"description\": \"CWE-416 Use After Free\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-08-07T15:34:11.687Z\"}}], \"cna\": {\"title\": \"KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache\", \"affected\": [{\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"6211753fdfd05af9e08f54c8d0ba3ee516034878\", \"lessThan\": \"d04acadb6490aa3314f9c9e087691e55de153b88\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"6211753fdfd05af9e08f54c8d0ba3ee516034878\", \"lessThan\": \"ba7be666740847d967822bed15500656b26bc703\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"6211753fdfd05af9e08f54c8d0ba3ee516034878\", \"lessThan\": \"12c2759ab1343c124ed46ba48f27bd1ef5d2dff4\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"6211753fdfd05af9e08f54c8d0ba3ee516034878\", \"lessThan\": \"dba788e25f05209adf2b0175eb1691dc89fb1ba6\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"6211753fdfd05af9e08f54c8d0ba3ee516034878\", \"lessThan\": \"65b201bf3e9af1b0254243a5881390eda56f72d1\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"6211753fdfd05af9e08f54c8d0ba3ee516034878\", \"lessThan\": \"dd3956a1b3dd11f46488c928cb890d6937d1ca80\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"6211753fdfd05af9e08f54c8d0ba3ee516034878\", \"lessThan\": \"ad362fe07fecf0aba839ff2cc59a3617bd42c33f\", \"versionType\": \"git\"}], \"programFiles\": [\"arch/arm64/kvm/vgic/vgic-its.c\"], \"defaultStatus\": \"unaffected\"}, {\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"3.11\"}, {\"status\": \"unaffected\", \"version\": \"0\", \"lessThan\": \"3.11\", \"versionType\": \"semver\"}, {\"status\": \"unaffected\", \"version\": \"5.4.269\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.4.*\"}, {\"status\": \"unaffected\", \"version\": \"5.10.209\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.10.*\"}, {\"status\": \"unaffected\", \"version\": \"5.15.148\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.15.*\"}, {\"status\": \"unaffected\", \"version\": \"6.1.75\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.1.*\"}, {\"status\": \"unaffected\", \"version\": \"6.6.14\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.6.*\"}, {\"status\": \"unaffected\", \"version\": \"6.7.2\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.7.*\"}, {\"status\": \"unaffected\", \"version\": \"6.8\", \"versionType\": \"original_commit_for_fix\", \"lessThanOrEqual\": \"*\"}], \"programFiles\": [\"arch/arm64/kvm/vgic/vgic-its.c\"], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://git.kernel.org/stable/c/d04acadb6490aa3314f9c9e087691e55de153b88\"}, {\"url\": \"https://git.kernel.org/stable/c/ba7be666740847d967822bed15500656b26bc703\"}, {\"url\": \"https://git.kernel.org/stable/c/12c2759ab1343c124ed46ba48f27bd1ef5d2dff4\"}, {\"url\": \"https://git.kernel.org/stable/c/dba788e25f05209adf2b0175eb1691dc89fb1ba6\"}, {\"url\": \"https://git.kernel.org/stable/c/65b201bf3e9af1b0254243a5881390eda56f72d1\"}, {\"url\": \"https://git.kernel.org/stable/c/dd3956a1b3dd11f46488c928cb890d6937d1ca80\"}, {\"url\": \"https://git.kernel.org/stable/c/ad362fe07fecf0aba839ff2cc59a3617bd42c33f\"}], \"x_generator\": {\"engine\": \"bippy-1.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\nKVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache\\n\\nThere is a potential UAF scenario in the case of an LPI translation\\ncache hit racing with an operation that invalidates the cache, such\\nas a DISCARD ITS command. The root of the problem is that\\nvgic_its_check_cache() does not elevate the refcount on the vgic_irq\\nbefore dropping the lock that serializes refcount changes.\\n\\nHave vgic_its_check_cache() raise the refcount on the returned vgic_irq\\nand add the corresponding decrement after queueing the interrupt.\"}], \"cpeApplicability\": [{\"nodes\": [{\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.4.269\", \"versionStartIncluding\": \"3.11\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.10.209\", \"versionStartIncluding\": \"3.11\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.15.148\", \"versionStartIncluding\": \"3.11\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.1.75\", \"versionStartIncluding\": \"3.11\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.6.14\", \"versionStartIncluding\": \"3.11\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.7.2\", \"versionStartIncluding\": \"3.11\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.8\", \"versionStartIncluding\": \"3.11\"}], \"operator\": \"OR\"}]}], \"providerMetadata\": {\"orgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"shortName\": \"Linux\", \"dateUpdated\": \"2025-12-20T08:51:31.873Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2024-26598\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-12-20T08:51:31.873Z\", \"dateReserved\": \"2024-02-19T14:20:24.128Z\", \"assignerOrgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"datePublished\": \"2024-02-23T14:46:26.672Z\", \"assignerShortName\": \"Linux\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
CERTFR-2024-AVI-0226
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, une élévation de privilèges et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 16.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 18.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 20.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 14.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 22.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2024-26601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26601"
},
{
"name": "CVE-2024-1085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1085"
},
{
"name": "CVE-2023-52436",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52436"
},
{
"name": "CVE-2023-52448",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52448"
},
{
"name": "CVE-2023-52456",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52456"
},
{
"name": "CVE-2023-46838",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46838"
},
{
"name": "CVE-2021-44879",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44879"
},
{
"name": "CVE-2023-5633",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5633"
},
{
"name": "CVE-2023-51782",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51782"
},
{
"name": "CVE-2024-26600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26600"
},
{
"name": "CVE-2024-26589",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26589"
},
{
"name": "CVE-2024-0646",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0646"
},
{
"name": "CVE-2023-52593",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52593"
},
{
"name": "CVE-2024-26597",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26597"
},
{
"name": "CVE-2023-46343",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46343"
},
{
"name": "CVE-2023-52454",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52454"
},
{
"name": "CVE-2023-4244",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4244"
},
{
"name": "CVE-2024-26627",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26627"
},
{
"name": "CVE-2024-26581",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26581"
},
{
"name": "CVE-2023-52600",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52600"
},
{
"name": "CVE-2023-52587",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52587"
},
{
"name": "CVE-2023-51779",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51779"
},
{
"name": "CVE-2023-6817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6817"
},
{
"name": "CVE-2023-52605",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52605"
},
{
"name": "CVE-2024-0193",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0193"
},
{
"name": "CVE-2023-52604",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52604"
},
{
"name": "CVE-2023-52601",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52601"
},
{
"name": "CVE-2024-26598",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26598"
},
{
"name": "CVE-2023-52603",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52603"
},
{
"name": "CVE-2024-26628",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26628"
},
{
"name": "CVE-2023-52462",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52462"
},
{
"name": "CVE-2023-52469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52469"
},
{
"name": "CVE-2023-52584",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52584"
},
{
"name": "CVE-2024-26625",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26625"
},
{
"name": "CVE-2023-52451",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52451"
},
{
"name": "CVE-2024-0607",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0607"
},
{
"name": "CVE-2024-26599",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26599"
},
{
"name": "CVE-2024-26592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26592"
},
{
"name": "CVE-2023-52589",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52589"
},
{
"name": "CVE-2024-24860",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24860"
},
{
"name": "CVE-2023-52599",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52599"
},
{
"name": "CVE-2023-52438",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52438"
},
{
"name": "CVE-2023-52439",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52439"
},
{
"name": "CVE-2023-52470",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52470"
},
{
"name": "CVE-2023-46862",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46862"
},
{
"name": "CVE-2023-52583",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52583"
},
{
"name": "CVE-2023-52602",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52602"
},
{
"name": "CVE-2024-26588",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26588"
},
{
"name": "CVE-2023-52445",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52445"
},
{
"name": "CVE-2024-26624",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26624"
},
{
"name": "CVE-2023-51780",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51780"
},
{
"name": "CVE-2024-26594",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26594"
},
{
"name": "CVE-2023-50431",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50431"
},
{
"name": "CVE-2023-22995",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22995"
},
{
"name": "CVE-2023-52458",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52458"
},
{
"name": "CVE-2023-52588",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52588"
},
{
"name": "CVE-2023-52598",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52598"
},
{
"name": "CVE-2023-6932",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6932"
},
{
"name": "CVE-2023-52594",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52594"
},
{
"name": "CVE-2023-52595",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52595"
},
{
"name": "CVE-2024-26591",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26591"
},
{
"name": "CVE-2023-52447",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52447"
},
{
"name": "CVE-2023-52464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52464"
},
{
"name": "CVE-2023-52606",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52606"
},
{
"name": "CVE-2023-7192",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7192"
},
{
"name": "CVE-2023-52597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52597"
},
{
"name": "CVE-2023-4134",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4134"
},
{
"name": "CVE-2024-1086",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1086"
},
{
"name": "CVE-2023-52463",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52463"
},
{
"name": "CVE-2023-52467",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52467"
},
{
"name": "CVE-2024-0340",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0340"
},
{
"name": "CVE-2023-52443",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52443"
},
{
"name": "CVE-2023-6121",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6121"
},
{
"name": "CVE-2023-52607",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52607"
},
{
"name": "CVE-2024-23849",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23849"
},
{
"name": "CVE-2023-6610",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6610"
},
{
"name": "CVE-2023-52457",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52457"
},
{
"name": "CVE-2023-52449",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52449"
},
{
"name": "CVE-2023-52444",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52444"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0226",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-03-15T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003ele noyau Linux d\u0027Ubuntu\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire,\nune \u00e9l\u00e9vation de privil\u00e8ges et une atteinte \u00e0 la confidentialit\u00e9 des\ndonn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-6681-3 du 13 mars 2024",
"url": "https://ubuntu.com/security/notices/USN-6681-3"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-6688-1 du 11 mars 2024",
"url": "https://ubuntu.com/security/notices/USN-6688-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-6686-2 du 13 mars 2024",
"url": "https://ubuntu.com/security/notices/USN-6686-2"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu LSN-0101-1 du 12 mars 2024",
"url": "https://ubuntu.com/security/notices/LSN-0101-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-6681-2 du 11 mars 2024",
"url": "https://ubuntu.com/security/notices/USN-6681-2"
}
]
}
CERTFR-2024-AVI-0383
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à la confidentialité des données et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 18.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 20.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 22.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-52633",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52633"
},
{
"name": "CVE-2024-26825",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26825"
},
{
"name": "CVE-2023-52622",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52622"
},
{
"name": "CVE-2023-52448",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52448"
},
{
"name": "CVE-2024-26696",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26696"
},
{
"name": "CVE-2023-52456",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52456"
},
{
"name": "CVE-2024-26650",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26650"
},
{
"name": "CVE-2024-26614",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26614"
},
{
"name": "CVE-2024-26595",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26595"
},
{
"name": "CVE-2024-26634",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26634"
},
{
"name": "CVE-2023-52621",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52621"
},
{
"name": "CVE-2024-26629",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26629"
},
{
"name": "CVE-2024-26586",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26586"
},
{
"name": "CVE-2024-26715",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26715"
},
{
"name": "CVE-2023-52637",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52637"
},
{
"name": "CVE-2024-26585",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26585"
},
{
"name": "CVE-2024-26638",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26638"
},
{
"name": "CVE-2023-52491",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52491"
},
{
"name": "CVE-2024-26704",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26704"
},
{
"name": "CVE-2024-26671",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26671"
},
{
"name": "CVE-2023-6536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6536"
},
{
"name": "CVE-2023-52453",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52453"
},
{
"name": "CVE-2024-26712",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26712"
},
{
"name": "CVE-2023-52642",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52642"
},
{
"name": "CVE-2024-26600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26600"
},
{
"name": "CVE-2023-52635",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52635"
},
{
"name": "CVE-2023-52593",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52593"
},
{
"name": "CVE-2023-52489",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52489"
},
{
"name": "CVE-2023-52638",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52638"
},
{
"name": "CVE-2023-52492",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52492"
},
{
"name": "CVE-2024-26665",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26665"
},
{
"name": "CVE-2023-52611",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52611"
},
{
"name": "CVE-2023-52454",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52454"
},
{
"name": "CVE-2024-26627",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26627"
},
{
"name": "CVE-2023-52632",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52632"
},
{
"name": "CVE-2024-26910",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26910"
},
{
"name": "CVE-2023-52587",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52587"
},
{
"name": "CVE-2024-26698",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26698"
},
{
"name": "CVE-2024-26632",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26632"
},
{
"name": "CVE-2024-26645",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26645"
},
{
"name": "CVE-2024-26702",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26702"
},
{
"name": "CVE-2024-26631",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26631"
},
{
"name": "CVE-2024-26673",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26673"
},
{
"name": "CVE-2024-26720",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26720"
},
{
"name": "CVE-2024-26615",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26615"
},
{
"name": "CVE-2024-26669",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26669"
},
{
"name": "CVE-2023-52618",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52618"
},
{
"name": "CVE-2023-52604",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52604"
},
{
"name": "CVE-2023-52643",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52643"
},
{
"name": "CVE-2023-52601",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52601"
},
{
"name": "CVE-2024-26722",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26722"
},
{
"name": "CVE-2024-26598",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26598"
},
{
"name": "CVE-2024-26679",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26679"
},
{
"name": "CVE-2023-52616",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52616"
},
{
"name": "CVE-2023-52435",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52435"
},
{
"name": "CVE-2024-26707",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26707"
},
{
"name": "CVE-2023-52455",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52455"
},
{
"name": "CVE-2024-26695",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26695"
},
{
"name": "CVE-2024-26647",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26647"
},
{
"name": "CVE-2024-26623",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26623"
},
{
"name": "CVE-2023-52486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52486"
},
{
"name": "CVE-2024-26670",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26670"
},
{
"name": "CVE-2023-52619",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52619"
},
{
"name": "CVE-2023-52617",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52617"
},
{
"name": "CVE-2024-26920",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26920"
},
{
"name": "CVE-2024-26593",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26593"
},
{
"name": "CVE-2024-26676",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26676"
},
{
"name": "CVE-2024-26916",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26916"
},
{
"name": "CVE-2023-52462",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52462"
},
{
"name": "CVE-2024-26636",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26636"
},
{
"name": "CVE-2023-6356",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6356"
},
{
"name": "CVE-2023-52609",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52609"
},
{
"name": "CVE-2024-26829",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26829"
},
{
"name": "CVE-2023-52469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52469"
},
{
"name": "CVE-2023-52493",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52493"
},
{
"name": "CVE-2023-52584",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52584"
},
{
"name": "CVE-2024-26606",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26606"
},
{
"name": "CVE-2023-52488",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52488"
},
{
"name": "CVE-2024-26625",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26625"
},
{
"name": "CVE-2024-26635",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26635"
},
{
"name": "CVE-2023-52451",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52451"
},
{
"name": "CVE-2024-26649",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26649"
},
{
"name": "CVE-2023-52631",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52631"
},
{
"name": "CVE-2023-52608",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52608"
},
{
"name": "CVE-2024-26592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26592"
},
{
"name": "CVE-2023-52589",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52589"
},
{
"name": "CVE-2024-26697",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26697"
},
{
"name": "CVE-2024-26826",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26826"
},
{
"name": "CVE-2024-26583",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26583"
},
{
"name": "CVE-2024-26685",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26685"
},
{
"name": "CVE-2024-24860",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24860"
},
{
"name": "CVE-2023-52599",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52599"
},
{
"name": "CVE-2023-52473",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52473"
},
{
"name": "CVE-2024-26607",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26607"
},
{
"name": "CVE-2023-52472",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52472"
},
{
"name": "CVE-2024-26663",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26663"
},
{
"name": "CVE-2024-26675",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26675"
},
{
"name": "CVE-2023-52470",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52470"
},
{
"name": "CVE-2024-26610",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26610"
},
{
"name": "CVE-2023-52583",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52583"
},
{
"name": "CVE-2024-26584",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26584"
},
{
"name": "CVE-2023-52602",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52602"
},
{
"name": "CVE-2023-52445",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52445"
},
{
"name": "CVE-2023-6535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6535"
},
{
"name": "CVE-2023-52498",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52498"
},
{
"name": "CVE-2024-26618",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26618"
},
{
"name": "CVE-2023-52446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52446"
},
{
"name": "CVE-2023-52487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52487"
},
{
"name": "CVE-2024-1151",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1151"
},
{
"name": "CVE-2023-52497",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52497"
},
{
"name": "CVE-2024-26646",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26646"
},
{
"name": "CVE-2024-26668",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26668"
},
{
"name": "CVE-2023-52612",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52612"
},
{
"name": "CVE-2024-26640",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26640"
},
{
"name": "CVE-2024-26594",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26594"
},
{
"name": "CVE-2023-52627",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52627"
},
{
"name": "CVE-2023-52458",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52458"
},
{
"name": "CVE-2023-52588",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52588"
},
{
"name": "CVE-2023-52468",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52468"
},
{
"name": "CVE-2024-26602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26602"
},
{
"name": "CVE-2024-26644",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26644"
},
{
"name": "CVE-2023-52465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52465"
},
{
"name": "CVE-2023-52598",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52598"
},
{
"name": "CVE-2023-52490",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52490"
},
{
"name": "CVE-2024-26633",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26633"
},
{
"name": "CVE-2023-52450",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52450"
},
{
"name": "CVE-2023-52594",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52594"
},
{
"name": "CVE-2024-26808",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26808"
},
{
"name": "CVE-2023-52595",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52595"
},
{
"name": "CVE-2024-26620",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26620"
},
{
"name": "CVE-2023-52623",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52623"
},
{
"name": "CVE-2023-52447",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52447"
},
{
"name": "CVE-2023-52464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52464"
},
{
"name": "CVE-2024-26608",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26608"
},
{
"name": "CVE-2023-52615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52615"
},
{
"name": "CVE-2023-52610",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52610"
},
{
"name": "CVE-2024-26660",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26660"
},
{
"name": "CVE-2024-26689",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26689"
},
{
"name": "CVE-2023-52606",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52606"
},
{
"name": "CVE-2023-52597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52597"
},
{
"name": "CVE-2023-52495",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52495"
},
{
"name": "CVE-2024-26717",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26717"
},
{
"name": "CVE-2024-26616",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26616"
},
{
"name": "CVE-2024-26582",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26582"
},
{
"name": "CVE-2024-2201",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2201"
},
{
"name": "CVE-2024-26641",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26641"
},
{
"name": "CVE-2023-52626",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52626"
},
{
"name": "CVE-2023-52463",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52463"
},
{
"name": "CVE-2023-52467",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52467"
},
{
"name": "CVE-2023-52443",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52443"
},
{
"name": "CVE-2023-52591",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52591"
},
{
"name": "CVE-2023-52614",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52614"
},
{
"name": "CVE-2024-26664",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26664"
},
{
"name": "CVE-2023-52452",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52452"
},
{
"name": "CVE-2023-52494",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52494"
},
{
"name": "CVE-2024-26612",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26612"
},
{
"name": "CVE-2023-52607",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52607"
},
{
"name": "CVE-2024-23849",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23849"
},
{
"name": "CVE-2024-26684",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26684"
},
{
"name": "CVE-2023-52457",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52457"
},
{
"name": "CVE-2023-52449",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52449"
},
{
"name": "CVE-2023-52444",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52444"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0383",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-05-10T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003ele noyau Linux d\u0027Ubuntu\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance,\nune atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une atteinte \u00e0\nl\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-6767-1 du 07 mai 2024",
"url": "https://ubuntu.com/security/notices/USN-6767-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-6765-1 du 07 mai 2024",
"url": "https://ubuntu.com/security/notices/USN-6765-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-6766-1 du 07 mai 2024",
"url": "https://ubuntu.com/security/notices/USN-6766-1"
}
]
}
CERTFR-2024-AVI-0333
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, un déni de service à distance et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 20.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 23.10",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 22.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-52436",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52436"
},
{
"name": "CVE-2023-52448",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52448"
},
{
"name": "CVE-2023-52456",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52456"
},
{
"name": "CVE-2023-46838",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46838"
},
{
"name": "CVE-2024-26586",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26586"
},
{
"name": "CVE-2023-52429",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52429"
},
{
"name": "CVE-2023-1194",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1194"
},
{
"name": "CVE-2023-52480",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52480"
},
{
"name": "CVE-2024-26589",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26589"
},
{
"name": "CVE-2024-26597",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26597"
},
{
"name": "CVE-2023-52441",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52441"
},
{
"name": "CVE-2023-52454",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52454"
},
{
"name": "CVE-2024-26631",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26631"
},
{
"name": "CVE-2023-52340",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52340"
},
{
"name": "CVE-2024-26598",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26598"
},
{
"name": "CVE-2023-52435",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52435"
},
{
"name": "CVE-2023-32254",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32254"
},
{
"name": "CVE-2023-52462",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52462"
},
{
"name": "CVE-2023-52609",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52609"
},
{
"name": "CVE-2023-52469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52469"
},
{
"name": "CVE-2023-52451",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52451"
},
{
"name": "CVE-2024-0607",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0607"
},
{
"name": "CVE-2024-24860",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24860"
},
{
"name": "CVE-2023-38430",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38430"
},
{
"name": "CVE-2023-52438",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52438"
},
{
"name": "CVE-2023-32258",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32258"
},
{
"name": "CVE-2023-52439",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52439"
},
{
"name": "CVE-2023-52470",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52470"
},
{
"name": "CVE-2023-52445",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52445"
},
{
"name": "CVE-2024-23850",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23850"
},
{
"name": "CVE-2023-52612",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52612"
},
{
"name": "CVE-2023-52434",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52434"
},
{
"name": "CVE-2024-23851",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23851"
},
{
"name": "CVE-2023-3867",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3867"
},
{
"name": "CVE-2023-50431",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50431"
},
{
"name": "CVE-2023-52458",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52458"
},
{
"name": "CVE-2024-26633",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26633"
},
{
"name": "CVE-2024-26591",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26591"
},
{
"name": "CVE-2023-52464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52464"
},
{
"name": "CVE-2023-52610",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52610"
},
{
"name": "CVE-2023-38427",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38427"
},
{
"name": "CVE-2023-52463",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52463"
},
{
"name": "CVE-2023-52467",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52467"
},
{
"name": "CVE-2023-52443",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52443"
},
{
"name": "CVE-2023-52442",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52442"
},
{
"name": "CVE-2024-22705",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22705"
},
{
"name": "CVE-2023-38431",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38431"
},
{
"name": "CVE-2023-6610",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6610"
},
{
"name": "CVE-2023-52457",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52457"
},
{
"name": "CVE-2023-52449",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52449"
},
{
"name": "CVE-2023-52444",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52444"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0333",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-04-19T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003ele noyau Linux d\u0027Ubuntu\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par\nl\u0027\u00e9diteur, un d\u00e9ni de service \u00e0 distance et une \u00e9l\u00e9vation de privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-6725-2 du 16 avril 2024",
"url": "https://ubuntu.com/security/notices/USN-6725-2"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-6726-3 du 17 avril 2024",
"url": "https://ubuntu.com/security/notices/USN-6726-3"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-6724-2 du 16 avril 2024",
"url": "https://ubuntu.com/security/notices/USN-6724-2"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-6726-2 du 16 avril 2024",
"url": "https://ubuntu.com/security/notices/USN-6726-2"
}
]
}
CERTFR-2024-AVI-0265
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer une élévation de privilèges, une atteinte à la confidentialité des données et une exécution de code arbitraire.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15 SP5 | ||
| SUSE | openSUSE Leap | openSUSE Leap 15.5 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 15-SP5 | ||
| SUSE | openSUSE Leap | openSUSE Leap 15.3 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 12 SP5 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15 SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15 SP2 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 15-SP2 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 12 SP5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12 SP5 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.2 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15 SP3 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.1 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro for Rancher 5.4 | ||
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time 12 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability Extension 12 SP5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15 SP5 | ||
| SUSE | SUSE Manager Server | SUSE Manager Server 4.1 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.3 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 | ||
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time 15 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 12 12-SP5 | ||
| SUSE | openSUSE Leap | openSUSE Leap Micro 5.3 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro for Rancher 5.3 | ||
| SUSE | SUSE Manager Retail Branch Server | SUSE Manager Retail Branch Server 4.1 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP2 Business Critical Linux 15-SP2 | ||
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time 15 SP4 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability Extension 15 SP2 | ||
| SUSE | SUSE Manager Proxy | SUSE Manager Proxy 4.1 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15 SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Software Development Kit 12 SP5 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15 SP3 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.5 | ||
| SUSE | openSUSE Leap | openSUSE Leap Micro 5.4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP2 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP3 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.4 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 15-SP4 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15 SP2 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise High Performance Computing 15 SP5",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.5",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.3",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 12 SP5",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15 SP4",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP2",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.2",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.1",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro for Rancher 5.4",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Real Time",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability Extension 12 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Server 4.1",
"product": {
"name": "SUSE Manager Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.3",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Real Time",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 12 12-SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap Micro 5.3",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro for Rancher 5.3",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Retail Branch Server 4.1",
"product": {
"name": "SUSE Manager Retail Branch Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP2 Business Critical Linux 15-SP2",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Real Time",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP3",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability Extension 15 SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Proxy 4.1",
"product": {
"name": "SUSE Manager Proxy",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15 SP3",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.5",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap Micro 5.4",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.4",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15 SP2",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-35827",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35827"
},
{
"name": "CVE-2023-52448",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52448"
},
{
"name": "CVE-2023-52456",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52456"
},
{
"name": "CVE-2023-46813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46813"
},
{
"name": "CVE-2024-26595",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26595"
},
{
"name": "CVE-2021-47076",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47076"
},
{
"name": "CVE-2023-52532",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52532"
},
{
"name": "CVE-2023-0461",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0461"
},
{
"name": "CVE-2020-36777",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36777"
},
{
"name": "CVE-2021-47078",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47078"
},
{
"name": "CVE-2024-26586",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26586"
},
{
"name": "CVE-2024-26585",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26585"
},
{
"name": "CVE-2023-52429",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52429"
},
{
"name": "CVE-2023-52559",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52559"
},
{
"name": "CVE-2021-46953",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46953"
},
{
"name": "CVE-2024-26603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26603"
},
{
"name": "CVE-2023-6536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6536"
},
{
"name": "CVE-2023-6531",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6531"
},
{
"name": "CVE-2024-26600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26600"
},
{
"name": "CVE-2023-28746",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28746"
},
{
"name": "CVE-2021-46904",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46904"
},
{
"name": "CVE-2024-26589",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26589"
},
{
"name": "CVE-2019-25162",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25162"
},
{
"name": "CVE-2023-52478",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52478"
},
{
"name": "CVE-2023-46343",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46343"
},
{
"name": "CVE-2021-46929",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46929"
},
{
"name": "CVE-2021-46905",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46905"
},
{
"name": "CVE-2021-47061",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47061"
},
{
"name": "CVE-2023-51779",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51779"
},
{
"name": "CVE-2021-46924",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46924"
},
{
"name": "CVE-2021-46906",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46906"
},
{
"name": "CVE-2021-47012",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47012"
},
{
"name": "CVE-2023-52340",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52340"
},
{
"name": "CVE-2023-6817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6817"
},
{
"name": "CVE-2023-52605",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52605"
},
{
"name": "CVE-2021-46964",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46964"
},
{
"name": "CVE-2024-26598",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26598"
},
{
"name": "CVE-2021-46991",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46991"
},
{
"name": "CVE-2023-52482",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52482"
},
{
"name": "CVE-2022-20154",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20154"
},
{
"name": "CVE-2021-47013",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47013"
},
{
"name": "CVE-2021-46966",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46966"
},
{
"name": "CVE-2023-52475",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52475"
},
{
"name": "CVE-2024-26593",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26593"
},
{
"name": "CVE-2023-6270",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6270"
},
{
"name": "CVE-2022-48627",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48627"
},
{
"name": "CVE-2021-46915",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46915"
},
{
"name": "CVE-2021-46989",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46989"
},
{
"name": "CVE-2023-6356",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6356"
},
{
"name": "CVE-2021-47054",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47054"
},
{
"name": "CVE-2023-52484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52484"
},
{
"name": "CVE-2023-52569",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52569"
},
{
"name": "CVE-2023-52451",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52451"
},
{
"name": "CVE-2024-0607",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0607"
},
{
"name": "CVE-2024-26607",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26607"
},
{
"name": "CVE-2023-52439",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52439"
},
{
"name": "CVE-2023-52574",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52574"
},
{
"name": "CVE-2023-52445",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52445"
},
{
"name": "CVE-2024-23850",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23850"
},
{
"name": "CVE-2023-6535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6535"
},
{
"name": "CVE-2021-47083",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47083"
},
{
"name": "CVE-2021-47060",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47060"
},
{
"name": "CVE-2021-46974",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46974"
},
{
"name": "CVE-2024-1151",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1151"
},
{
"name": "CVE-2021-47077",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47077"
},
{
"name": "CVE-2024-23851",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23851"
},
{
"name": "CVE-2021-46923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46923"
},
{
"name": "CVE-2024-26602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26602"
},
{
"name": "CVE-2021-46934",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46934"
},
{
"name": "CVE-2023-39191",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39191"
},
{
"name": "CVE-2021-46932",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46932"
},
{
"name": "CVE-2024-26591",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26591"
},
{
"name": "CVE-2023-52447",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52447"
},
{
"name": "CVE-2023-52464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52464"
},
{
"name": "CVE-2021-47069",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47069"
},
{
"name": "CVE-2023-52502",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52502"
},
{
"name": "CVE-2021-33200",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33200"
},
{
"name": "CVE-2023-52597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52597"
},
{
"name": "CVE-2023-5197",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5197"
},
{
"name": "CVE-2023-52531",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52531"
},
{
"name": "CVE-2021-46921",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46921"
},
{
"name": "CVE-2023-51042",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51042"
},
{
"name": "CVE-2023-52463",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52463"
},
{
"name": "CVE-2023-52467",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52467"
},
{
"name": "CVE-2024-0340",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0340"
},
{
"name": "CVE-2023-52443",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52443"
},
{
"name": "CVE-2023-52530",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52530"
},
{
"name": "CVE-2021-47005",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47005"
},
{
"name": "CVE-2020-36784",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36784"
},
{
"name": "CVE-2023-52452",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52452"
},
{
"name": "CVE-2024-23849",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23849"
},
{
"name": "CVE-2024-26622",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26622"
},
{
"name": "CVE-2021-46992",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46992"
},
{
"name": "CVE-2023-52457",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52457"
},
{
"name": "CVE-2023-52449",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52449"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0265",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-03-29T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003ele noyau Linux de SUSE\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges, une\natteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une ex\u00e9cution de code\narbitraire.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:0989-1 du 25 mars 2024",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20240989-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:0986-1 du 26 mars 2024",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20240986-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:1053-1 du 28 mars 2024",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20241053-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:1033-1 du 28 mars 2024",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20241033-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:0975-1 du 22 mars 2024",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20240975-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:0977-1 du 22 mars 2024",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20240977-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:0926-1 du 18 mars 2024",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20240926-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:1025-1 du 28 mars 2024",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20241025-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:1017-1 du 28 mars 2024",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20241017-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:0976-1 du 22 mars 2024",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20240976-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:1047-1 du 28 mars 2024",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20241047-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:1040-1 du 28 mars 2024",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20241040-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:1023-1 du 28 mars 2024",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20241023-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:1039-1 du 28 mars 2024",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20241039-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:0991-1 du 26 mars 2024",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20240991-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:1054-1 du 28 mars 2024",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20241054-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:1045-1 du 28 mars 2024",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20241045-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:0925-1 du 18 mars 2024",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20240925-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:0995-1 du 26 mars 2024",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20240995-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:1028-1 du 28 mars 2024",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20241028-1"
}
]
}
CERTFR-2024-AVI-0497
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Red Hat. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 8.6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time for x86_64 - 4 years of updates 9.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.8 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - TUS 8.6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.8 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - TUS 8.8 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server for ARM 64 - 4 years of updates 9.2 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.8 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.2 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 9.2 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.8 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.8 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time for NFV for x86_64 - 4 years of updates 9.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.2 s390x | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.8 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.2 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 9.2 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.2 aarch64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 9.2 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 9.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.2 ppc64le | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.8 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.8 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.8 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server for IBM z Systems - 4 years of updates 9.2 s390x | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 9.2 s390x | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.2 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6 x86_64 |
| Title | Publication Time | Tags | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Red Hat Enterprise Linux Server - AUS 8.6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time for x86_64 - 4 years of updates 9.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.8 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - TUS 8.6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.8 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - TUS 8.8 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server for ARM 64 - 4 years of updates 9.2 aarch64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.8 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 9.2 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.8 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.8 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time for NFV for x86_64 - 4 years of updates 9.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.2 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.8 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 9.2 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.2 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 9.2 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 9.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.2 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.8 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.8 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.8 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server for IBM z Systems - 4 years of updates 9.2 s390x",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 9.2 s390x",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.2 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2023-49568",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49568"
},
{
"name": "CVE-2023-3128",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3128"
},
{
"name": "CVE-2024-26586",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26586"
},
{
"name": "CVE-2023-6536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6536"
},
{
"name": "CVE-2023-51779",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51779"
},
{
"name": "CVE-2024-26598",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26598"
},
{
"name": "CVE-2021-47013",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47013"
},
{
"name": "CVE-2023-6356",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6356"
},
{
"name": "CVE-2024-26642",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26642"
},
{
"name": "CVE-2023-52639",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52639"
},
{
"name": "CVE-2023-1998",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1998"
},
{
"name": "CVE-2023-4155",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4155"
},
{
"name": "CVE-2023-6535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6535"
},
{
"name": "CVE-2023-1118",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1118"
},
{
"name": "CVE-2023-52578",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52578"
},
{
"name": "CVE-2024-25742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25742"
},
{
"name": "CVE-2024-25743",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25743"
},
{
"name": "CVE-2024-26602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26602"
},
{
"name": "CVE-2023-52667",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52667"
},
{
"name": "CVE-2023-49569",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49569"
},
{
"name": "CVE-2023-4822",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4822"
},
{
"name": "CVE-2023-52530",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52530"
},
{
"name": "CVE-2023-5090",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5090"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0497",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-06-14T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Red Hat. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Red Hat",
"vendor_advisories": [
{
"published_at": "2024-06-12",
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2024:3855",
"url": "https://access.redhat.com/errata/RHSA-2024:3855"
},
{
"published_at": "2024-06-12",
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2024:3854",
"url": "https://access.redhat.com/errata/RHSA-2024:3854"
},
{
"published_at": "2024-06-12",
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2024:3859",
"url": "https://access.redhat.com/errata/RHSA-2024:3859"
},
{
"published_at": "2024-06-13",
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2024:3925",
"url": "https://access.redhat.com/errata/RHSA-2024:3925"
},
{
"published_at": "2024-06-11",
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2024:3810",
"url": "https://access.redhat.com/errata/RHSA-2024:3810"
}
]
}
CERTFR-2024-AVI-0265
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer une élévation de privilèges, une atteinte à la confidentialité des données et une exécution de code arbitraire.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15 SP5 | ||
| SUSE | openSUSE Leap | openSUSE Leap 15.5 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 15-SP5 | ||
| SUSE | openSUSE Leap | openSUSE Leap 15.3 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 12 SP5 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15 SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15 SP2 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 15-SP2 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 12 SP5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12 SP5 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.2 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15 SP3 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.1 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro for Rancher 5.4 | ||
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time 12 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability Extension 12 SP5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15 SP5 | ||
| SUSE | SUSE Manager Server | SUSE Manager Server 4.1 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.3 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 | ||
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time 15 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 12 12-SP5 | ||
| SUSE | openSUSE Leap | openSUSE Leap Micro 5.3 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro for Rancher 5.3 | ||
| SUSE | SUSE Manager Retail Branch Server | SUSE Manager Retail Branch Server 4.1 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP2 Business Critical Linux 15-SP2 | ||
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time 15 SP4 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability Extension 15 SP2 | ||
| SUSE | SUSE Manager Proxy | SUSE Manager Proxy 4.1 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15 SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Software Development Kit 12 SP5 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15 SP3 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.5 | ||
| SUSE | openSUSE Leap | openSUSE Leap Micro 5.4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP2 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP3 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.4 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 15-SP4 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15 SP2 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise High Performance Computing 15 SP5",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.5",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.3",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 12 SP5",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15 SP4",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP2",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.2",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.1",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro for Rancher 5.4",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Real Time",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability Extension 12 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Server 4.1",
"product": {
"name": "SUSE Manager Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.3",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Real Time",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 12 12-SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap Micro 5.3",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro for Rancher 5.3",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Retail Branch Server 4.1",
"product": {
"name": "SUSE Manager Retail Branch Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP2 Business Critical Linux 15-SP2",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Real Time",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP3",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability Extension 15 SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Proxy 4.1",
"product": {
"name": "SUSE Manager Proxy",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15 SP3",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.5",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap Micro 5.4",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.4",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15 SP2",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-35827",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35827"
},
{
"name": "CVE-2023-52448",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52448"
},
{
"name": "CVE-2023-52456",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52456"
},
{
"name": "CVE-2023-46813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46813"
},
{
"name": "CVE-2024-26595",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26595"
},
{
"name": "CVE-2021-47076",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47076"
},
{
"name": "CVE-2023-52532",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52532"
},
{
"name": "CVE-2023-0461",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0461"
},
{
"name": "CVE-2020-36777",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36777"
},
{
"name": "CVE-2021-47078",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47078"
},
{
"name": "CVE-2024-26586",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26586"
},
{
"name": "CVE-2024-26585",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26585"
},
{
"name": "CVE-2023-52429",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52429"
},
{
"name": "CVE-2023-52559",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52559"
},
{
"name": "CVE-2021-46953",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46953"
},
{
"name": "CVE-2024-26603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26603"
},
{
"name": "CVE-2023-6536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6536"
},
{
"name": "CVE-2023-6531",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6531"
},
{
"name": "CVE-2024-26600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26600"
},
{
"name": "CVE-2023-28746",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28746"
},
{
"name": "CVE-2021-46904",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46904"
},
{
"name": "CVE-2024-26589",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26589"
},
{
"name": "CVE-2019-25162",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25162"
},
{
"name": "CVE-2023-52478",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52478"
},
{
"name": "CVE-2023-46343",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46343"
},
{
"name": "CVE-2021-46929",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46929"
},
{
"name": "CVE-2021-46905",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46905"
},
{
"name": "CVE-2021-47061",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47061"
},
{
"name": "CVE-2023-51779",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51779"
},
{
"name": "CVE-2021-46924",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46924"
},
{
"name": "CVE-2021-46906",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46906"
},
{
"name": "CVE-2021-47012",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47012"
},
{
"name": "CVE-2023-52340",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52340"
},
{
"name": "CVE-2023-6817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6817"
},
{
"name": "CVE-2023-52605",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52605"
},
{
"name": "CVE-2021-46964",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46964"
},
{
"name": "CVE-2024-26598",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26598"
},
{
"name": "CVE-2021-46991",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46991"
},
{
"name": "CVE-2023-52482",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52482"
},
{
"name": "CVE-2022-20154",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20154"
},
{
"name": "CVE-2021-47013",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47013"
},
{
"name": "CVE-2021-46966",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46966"
},
{
"name": "CVE-2023-52475",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52475"
},
{
"name": "CVE-2024-26593",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26593"
},
{
"name": "CVE-2023-6270",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6270"
},
{
"name": "CVE-2022-48627",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48627"
},
{
"name": "CVE-2021-46915",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46915"
},
{
"name": "CVE-2021-46989",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46989"
},
{
"name": "CVE-2023-6356",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6356"
},
{
"name": "CVE-2021-47054",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47054"
},
{
"name": "CVE-2023-52484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52484"
},
{
"name": "CVE-2023-52569",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52569"
},
{
"name": "CVE-2023-52451",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52451"
},
{
"name": "CVE-2024-0607",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0607"
},
{
"name": "CVE-2024-26607",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26607"
},
{
"name": "CVE-2023-52439",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52439"
},
{
"name": "CVE-2023-52574",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52574"
},
{
"name": "CVE-2023-52445",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52445"
},
{
"name": "CVE-2024-23850",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23850"
},
{
"name": "CVE-2023-6535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6535"
},
{
"name": "CVE-2021-47083",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47083"
},
{
"name": "CVE-2021-47060",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47060"
},
{
"name": "CVE-2021-46974",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46974"
},
{
"name": "CVE-2024-1151",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1151"
},
{
"name": "CVE-2021-47077",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47077"
},
{
"name": "CVE-2024-23851",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23851"
},
{
"name": "CVE-2021-46923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46923"
},
{
"name": "CVE-2024-26602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26602"
},
{
"name": "CVE-2021-46934",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46934"
},
{
"name": "CVE-2023-39191",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39191"
},
{
"name": "CVE-2021-46932",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46932"
},
{
"name": "CVE-2024-26591",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26591"
},
{
"name": "CVE-2023-52447",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52447"
},
{
"name": "CVE-2023-52464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52464"
},
{
"name": "CVE-2021-47069",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47069"
},
{
"name": "CVE-2023-52502",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52502"
},
{
"name": "CVE-2021-33200",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33200"
},
{
"name": "CVE-2023-52597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52597"
},
{
"name": "CVE-2023-5197",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5197"
},
{
"name": "CVE-2023-52531",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52531"
},
{
"name": "CVE-2021-46921",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46921"
},
{
"name": "CVE-2023-51042",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51042"
},
{
"name": "CVE-2023-52463",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52463"
},
{
"name": "CVE-2023-52467",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52467"
},
{
"name": "CVE-2024-0340",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0340"
},
{
"name": "CVE-2023-52443",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52443"
},
{
"name": "CVE-2023-52530",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52530"
},
{
"name": "CVE-2021-47005",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47005"
},
{
"name": "CVE-2020-36784",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36784"
},
{
"name": "CVE-2023-52452",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52452"
},
{
"name": "CVE-2024-23849",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23849"
},
{
"name": "CVE-2024-26622",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26622"
},
{
"name": "CVE-2021-46992",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46992"
},
{
"name": "CVE-2023-52457",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52457"
},
{
"name": "CVE-2023-52449",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52449"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0265",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-03-29T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003ele noyau Linux de SUSE\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges, une\natteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une ex\u00e9cution de code\narbitraire.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:0989-1 du 25 mars 2024",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20240989-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:0986-1 du 26 mars 2024",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20240986-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:1053-1 du 28 mars 2024",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20241053-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:1033-1 du 28 mars 2024",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20241033-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:0975-1 du 22 mars 2024",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20240975-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:0977-1 du 22 mars 2024",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20240977-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:0926-1 du 18 mars 2024",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20240926-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:1025-1 du 28 mars 2024",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20241025-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:1017-1 du 28 mars 2024",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20241017-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:0976-1 du 22 mars 2024",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20240976-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:1047-1 du 28 mars 2024",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20241047-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:1040-1 du 28 mars 2024",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20241040-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:1023-1 du 28 mars 2024",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20241023-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:1039-1 du 28 mars 2024",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20241039-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:0991-1 du 26 mars 2024",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20240991-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:1054-1 du 28 mars 2024",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20241054-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:1045-1 du 28 mars 2024",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20241045-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:0925-1 du 18 mars 2024",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20240925-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:0995-1 du 26 mars 2024",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20240995-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:1028-1 du 28 mars 2024",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20241028-1"
}
]
}
CERTFR-2025-AVI-0677
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Siemens. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Siemens | N/A | SIMATIC PCS neo V6.0 versions antérieures à V6.0 SP1 | ||
| Siemens | N/A | SIMATIC WinCC V17, v18 et V20 toutes versions pour les vulnérabilités CVE-2024-54678 et CVE-2025-40759 | ||
| Siemens | N/A | SIMATIC Control Function Library (CFL) toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIPROTEC 5 versions antérieures à 10.0 | ||
| Siemens | N/A | SIMATIC MTP Integrator toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC ProSave V17 toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC WinCC Unified Line Coordination toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC WinCC TeleControl toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC WinCC OA V3.19 versions antérieures à V3.19 P020 | ||
| Siemens | N/A | SIMATIC WinCC flexible ES toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC S7-PLCSIM V17 toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2024-54678. | ||
| Siemens | N/A | SIMATIC S7-Fail-safe Configuration Tool (S7-FCT) versions antérieures à 4.0.1 | ||
| Siemens | N/A | SIMATIC PCS neo V6.0 toutes versions pour la vulnérabilité CVE-2024-54678 | ||
| Siemens | N/A | SIMATIC eaSie Core Package (6DL5424-0AX00-0AV8) toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC MTP CREATOR V2.x et V3.x toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2025-30033. | ||
| Siemens | N/A | SIMATIC WinCC OA V3.18 versions antérieures à V3.18 P032 | ||
| Siemens | N/A | TIA Portal Cloud V19 versions antérieures à 5.2.1.1 | ||
| Siemens | N/A | SIMATIC D7-SYS toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC BATCH V10.0 toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC ODK 1500S toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC Process Historian 2020 toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour les vulnérabilités CVE-2025-30033 et CVE-2025-47809 | ||
| Siemens | N/A | SIMATIC S7-1500 Software Controller V2 toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | TIA Portal Cloud Connector toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC WinCC Unified Sequence toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC S7-PLCSIM V17 toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2025-40759. | ||
| Siemens | N/A | SIMATIC WinCC Runtime Advanced toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC Logon V2.0 toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC ProSave V19 versions antérieures à V19 Update 4 | ||
| Siemens | N/A | SIMATIC PDM Maintenance Station V5.0 toutes versions pour les vulnérabilités CVE-2025-30033 et CVE-2025-47809 | ||
| Siemens | N/A | SIMATIC Safety Matrix toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC Management Console toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SCALANCE XCM-/XRM-/XCH-/XRH-300 family versions antérieures à 3.2 | ||
| Siemens | N/A | SIMATIC BATCH V9.1 toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2025-30033. | ||
| Siemens | N/A | SIMATIC Process Function Library (PFL) V4.0 toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2025-30033. | ||
| Siemens | N/A | SIMATIC S7-1500 Software Controller V3 toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC STEP 7 CFC V20 toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2025-30033. | ||
| Siemens | N/A | SIMATIC NET PC Software toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC Route Control V9.1 toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC Process Historian 2022 toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC WinCC OA V3.20 versions antérieures à V3.20 P008 | ||
| Siemens | N/A | SIMATIC RTLS Locating Manager versions antérieures à 3.3 | ||
| Siemens | N/A | Siprotec 4 7SA6, 7SD5 et 7SD610 versions antérieures à 4.78 | ||
| Siemens | N/A | SIMATIC Automation Tool toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | TIA Portal Cloud V18 toutes versions pour les vulnérabilités CVE-2024-54678 et CVE-2025-40759 | ||
| Siemens | N/A | SIMATIC PDM V9.2 et V9.3 toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC WinCC Runtime Professional toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC WinCC Visualization Architect (SiVArc) toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC eaSie Workflow Skills toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC STEP 7 CFC V19 toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2025-30033. | ||
| Siemens | N/A | SIMATIC WinCC V19 versions antérieures à V19 Update 4 | ||
| Siemens | N/A | SIMATIC Management Agent toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC WinCC V7.5 et V8.0 toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC STEP 7 V5.7 toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC Automation Tool SDK Windows toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC Process Historian 2022 toutes versions pour la vulnérabilité CVE-2025-47809 | ||
| Siemens | N/A | SIMATIC S7-PLCSIM V20 versions antérieures à V20 Update 1 | ||
| Siemens | N/A | TIA Portal Cloud V17 toutes versions pour les vulnérabilités CVE-2024-54678 et CVE-2025-40759 | ||
| Siemens | N/A | SIMATIC Energy Suite toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC PCS 7 toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC Process Historian 2024 toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC STEP 7 V19 versions antérieures à V19 Update 4 | ||
| Siemens | N/A | TIA Portal Test Suite V17, v18, v19 et v20 toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC S7-PCT toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC Target toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC ProSave V18 toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2025-30033. | ||
| Siemens | N/A | SIMATIC Logon V1.6 toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2025-30033. | ||
| Siemens | N/A | SIMATIC STEP 7 V17 et V18 toutes versions pour les vulnérabilités CVE-2024-54678 et CVE-2025-40759 | ||
| Siemens | N/A | SIMATIC RTLS Locating Manager versions antérieures à 3.2 | ||
| Siemens | N/A | SIMATIC S7-PLCSIM Advanced versions antérieures à V7.0 Update 1 | ||
| Siemens | N/A | SIMATIC PCS neo V5.0 toutes versions pour la vulnérabilité CVE-2024-54678 | ||
| Siemens | N/A | SIMATIC STEP 7 V20 toutes versions pour les vulnérabilités CVE-2024-54678 et CVE-2025-40759 | ||
| Siemens | N/A | TIA Portal Cloud V20 toutes versions pour les vulnérabilités CVE-2024-54678 et CVE-2025-40759 | ||
| Siemens | N/A | Siprotec 4 toutes versions et tous modèles exceptés 7SA6, 7SD5, 7SD610 pour la vulnérabilité CVE-2024-52504. | ||
| Siemens | N/A | SIMATIC eaSie PCS 7 Skill Package (6DL5424-0BX00-0AV8) toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SCALANCE XC-300/XR-300/XC-400/XR-500WG/XR-500 versions antérieures à 3.2 | ||
| Siemens | N/A | SIMATIC S7-PLCSIM V17, V18 et V19 toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC WinCC Unified PC Runtime V18, V19 et V20 toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC PCS 7 Advanced Process Faceplates V9.1 toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC S7 F Systems V6.4 toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC Information Server toutes versions pour la vulnérabilité CVE-2025-47809 | ||
| Siemens | N/A | SIMATIC S7 F Systems V6.3 toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2025-30033. | ||
| Siemens | N/A | SIMATIC ProSave V20 toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC PCS 7 Logic Matrix V9.1 toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | WinCC Panel Image Setup toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC PCS neo V4.1 et V5.0 toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2024-54678. | ||
| Siemens | N/A | SIMATIC Route Control V10.0 toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC WinCC V8.1 versions antérieures à V8.1 Update 3 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SIMATIC PCS neo V6.0 versions ant\u00e9rieures \u00e0 V6.0 SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC WinCC V17, v18 et V20 toutes versions pour les vuln\u00e9rabilit\u00e9s CVE-2024-54678 et CVE-2025-40759",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC Control Function Library (CFL) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPROTEC 5 versions ant\u00e9rieures \u00e0 10.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC MTP Integrator toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ProSave V17 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC WinCC Unified Line Coordination toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC WinCC TeleControl toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC WinCC OA V3.19 versions ant\u00e9rieures \u00e0 V3.19 P020",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC WinCC flexible ES toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-PLCSIM V17 toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2024-54678.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-Fail-safe Configuration Tool (S7-FCT) versions ant\u00e9rieures \u00e0 4.0.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC PCS neo V6.0 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-54678",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC eaSie Core Package (6DL5424-0AX00-0AV8) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC MTP CREATOR V2.x et V3.x toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC WinCC OA V3.18 versions ant\u00e9rieures \u00e0 V3.18 P032",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "TIA Portal Cloud V19 versions ant\u00e9rieures \u00e0 5.2.1.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC D7-SYS toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC BATCH V10.0 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ODK 1500S toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC Process Historian 2020 toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour les vuln\u00e9rabilit\u00e9s CVE-2025-30033 et CVE-2025-47809",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 Software Controller V2 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "TIA Portal Cloud Connector toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC WinCC Unified Sequence toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-PLCSIM V17 toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-40759.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC WinCC Runtime Advanced toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC Logon V2.0 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ProSave V19 versions ant\u00e9rieures \u00e0 V19 Update 4",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC PDM Maintenance Station V5.0 toutes versions pour les vuln\u00e9rabilit\u00e9s CVE-2025-30033 et CVE-2025-47809",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC Safety Matrix toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC Management Console toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XCM-/XRM-/XCH-/XRH-300 family versions ant\u00e9rieures \u00e0 3.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC BATCH V9.1 toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC Process Function Library (PFL) V4.0 toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 Software Controller V3 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC STEP 7 CFC V20 toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC NET PC Software toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC Route Control V9.1 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC Process Historian 2022 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC WinCC OA V3.20 versions ant\u00e9rieures \u00e0 V3.20 P008",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC RTLS Locating Manager versions ant\u00e9rieures \u00e0 3.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Siprotec 4 7SA6, 7SD5 et 7SD610 versions ant\u00e9rieures \u00e0 4.78",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC Automation Tool toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "TIA Portal Cloud V18 toutes versions pour les vuln\u00e9rabilit\u00e9s CVE-2024-54678 et CVE-2025-40759",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC PDM V9.2 et V9.3 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC WinCC Runtime Professional toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC WinCC Visualization Architect (SiVArc) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC eaSie Workflow Skills toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC STEP 7 CFC V19 toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC WinCC V19 versions ant\u00e9rieures \u00e0 V19 Update 4",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC Management Agent toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC WinCC V7.5 et V8.0 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC STEP 7 V5.7 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC Automation Tool SDK Windows toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC Process Historian 2022 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-47809",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-PLCSIM V20 versions ant\u00e9rieures \u00e0 V20 Update 1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "TIA Portal Cloud V17 toutes versions pour les vuln\u00e9rabilit\u00e9s CVE-2024-54678 et CVE-2025-40759",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC Energy Suite toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC PCS 7 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC Process Historian 2024 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC STEP 7 V19 versions ant\u00e9rieures \u00e0 V19 Update 4",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "TIA Portal Test Suite V17, v18, v19 et v20 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-PCT toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC Target toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ProSave V18 toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC Logon V1.6 toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC STEP 7 V17 et V18 toutes versions pour les vuln\u00e9rabilit\u00e9s CVE-2024-54678 et CVE-2025-40759",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC RTLS Locating Manager versions ant\u00e9rieures \u00e0 3.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-PLCSIM Advanced versions ant\u00e9rieures \u00e0 V7.0 Update 1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC PCS neo V5.0 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-54678",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC STEP 7 V20 toutes versions pour les vuln\u00e9rabilit\u00e9s CVE-2024-54678 et CVE-2025-40759",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "TIA Portal Cloud V20 toutes versions pour les vuln\u00e9rabilit\u00e9s CVE-2024-54678 et CVE-2025-40759",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Siprotec 4 toutes versions et tous mod\u00e8les except\u00e9s 7SA6, 7SD5, 7SD610 pour la vuln\u00e9rabilit\u00e9 CVE-2024-52504. ",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC eaSie PCS 7 Skill Package (6DL5424-0BX00-0AV8) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XC-300/XR-300/XC-400/XR-500WG/XR-500 versions ant\u00e9rieures \u00e0 3.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-PLCSIM V17, V18 et V19 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC WinCC Unified PC Runtime V18, V19 et V20 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC PCS 7 Advanced Process Faceplates V9.1 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7 F Systems V6.4 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC Information Server toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-47809",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7 F Systems V6.3 toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ProSave V20 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC PCS 7 Logic Matrix V9.1 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "WinCC Panel Image Setup toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC PCS neo V4.1 et V5.0 toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2024-54678.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC Route Control V10.0 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC WinCC V8.1 versions ant\u00e9rieures \u00e0 V8.1 Update 3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2023-35827",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35827"
},
{
"name": "CVE-2024-40931",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40931"
},
{
"name": "CVE-2024-56596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56596"
},
{
"name": "CVE-2024-43907",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43907"
},
{
"name": "CVE-2024-56645",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56645"
},
{
"name": "CVE-2024-56659",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56659"
},
{
"name": "CVE-2024-46755",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46755"
},
{
"name": "CVE-2024-47748",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47748"
},
{
"name": "CVE-2024-26825",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26825"
},
{
"name": "CVE-2024-49863",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49863"
},
{
"name": "CVE-2024-41022",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41022"
},
{
"name": "CVE-2024-49907",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49907"
},
{
"name": "CVE-2024-53061",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53061"
},
{
"name": "CVE-2024-53052",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53052"
},
{
"name": "CVE-2023-52477",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52477"
},
{
"name": "CVE-2024-53097",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53097"
},
{
"name": "CVE-2024-46713",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46713"
},
{
"name": "CVE-2023-52622",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52622"
},
{
"name": "CVE-2024-9681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
},
{
"name": "CVE-2024-46844",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46844"
},
{
"name": "CVE-2024-43914",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43914"
},
{
"name": "CVE-2024-26696",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26696"
},
{
"name": "CVE-2024-56670",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56670"
},
{
"name": "CVE-2024-41009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41009"
},
{
"name": "CVE-2024-47697",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47697"
},
{
"name": "CVE-2024-46815",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46815"
},
{
"name": "CVE-2024-39503",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39503"
},
{
"name": "CVE-2025-40759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40759"
},
{
"name": "CVE-2022-48666",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48666"
},
{
"name": "CVE-2024-49890",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49890"
},
{
"name": "CVE-2024-50262",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50262"
},
{
"name": "CVE-2024-40988",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40988"
},
{
"name": "CVE-2024-50268",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50268"
},
{
"name": "CVE-2024-49903",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49903"
},
{
"name": "CVE-2024-49969",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49969"
},
{
"name": "CVE-2023-52804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52804"
},
{
"name": "CVE-2024-41004",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41004"
},
{
"name": "CVE-2024-46676",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46676"
},
{
"name": "CVE-2024-41070",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41070"
},
{
"name": "CVE-2024-46740",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46740"
},
{
"name": "CVE-2023-52845",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52845"
},
{
"name": "CVE-2021-44879",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44879"
},
{
"name": "CVE-2024-46798",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46798"
},
{
"name": "CVE-2024-50195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50195"
},
{
"name": "CVE-2024-53172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53172"
},
{
"name": "CVE-2024-46707",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46707"
},
{
"name": "CVE-2024-49967",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49967"
},
{
"name": "CVE-2024-41000",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41000"
},
{
"name": "CVE-2024-36974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36974"
},
{
"name": "CVE-2023-52818",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52818"
},
{
"name": "CVE-2024-56606",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56606"
},
{
"name": "CVE-2023-52637",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52637"
},
{
"name": "CVE-2024-46747",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46747"
},
{
"name": "CVE-2024-49858",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49858"
},
{
"name": "CVE-2023-52873",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52873"
},
{
"name": "CVE-2024-49948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49948"
},
{
"name": "CVE-2024-56594",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56594"
},
{
"name": "CVE-2024-26754",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26754"
},
{
"name": "CVE-2023-52858",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52858"
},
{
"name": "CVE-2024-46738",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46738"
},
{
"name": "CVE-2023-45863",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45863"
},
{
"name": "CVE-2024-56756",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56756"
},
{
"name": "CVE-2024-52332",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52332"
},
{
"name": "CVE-2024-46679",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46679"
},
{
"name": "CVE-2024-56724",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56724"
},
{
"name": "CVE-2024-53194",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53194"
},
{
"name": "CVE-2024-49878",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49878"
},
{
"name": "CVE-2023-51782",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51782"
},
{
"name": "CVE-2024-46673",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46673"
},
{
"name": "CVE-2024-41034",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41034"
},
{
"name": "CVE-2024-56723",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56723"
},
{
"name": "CVE-2024-53226",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53226"
},
{
"name": "CVE-2024-49884",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49884"
},
{
"name": "CVE-2024-46724",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46724"
},
{
"name": "CVE-2024-56569",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56569"
},
{
"name": "CVE-2024-50074",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50074"
},
{
"name": "CVE-2024-26790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26790"
},
{
"name": "CVE-2024-46791",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46791"
},
{
"name": "CVE-2024-50024",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50024"
},
{
"name": "CVE-2024-47684",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47684"
},
{
"name": "CVE-2024-49965",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49965"
},
{
"name": "CVE-2024-44969",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44969"
},
{
"name": "CVE-2024-56634",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56634"
},
{
"name": "CVE-2024-43098",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43098"
},
{
"name": "CVE-2024-42236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42236"
},
{
"name": "CVE-2024-56548",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56548"
},
{
"name": "CVE-2024-39469",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39469"
},
{
"name": "CVE-2024-39509",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39509"
},
{
"name": "CVE-2024-50202",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50202"
},
{
"name": "CVE-2023-5178",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5178"
},
{
"name": "CVE-2024-26845",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26845"
},
{
"name": "CVE-2024-26704",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26704"
},
{
"name": "CVE-2024-26671",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26671"
},
{
"name": "CVE-2024-46800",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46800"
},
{
"name": "CVE-2023-52810",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52810"
},
{
"name": "CVE-2024-46750",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46750"
},
{
"name": "CVE-2024-39484",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39484"
},
{
"name": "CVE-2024-53181",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53181"
},
{
"name": "CVE-2024-46722",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46722"
},
{
"name": "CVE-2024-26600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26600"
},
{
"name": "CVE-2024-47701",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47701"
},
{
"name": "CVE-2024-40971",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40971"
},
{
"name": "CVE-2023-52847",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52847"
},
{
"name": "CVE-2024-39505",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39505"
},
{
"name": "CVE-2023-52864",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52864"
},
{
"name": "CVE-2024-0646",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0646"
},
{
"name": "CVE-2024-50302",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50302"
},
{
"name": "CVE-2024-47713",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47713"
},
{
"name": "CVE-2024-49936",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49936"
},
{
"name": "CVE-2024-50267",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50267"
},
{
"name": "CVE-2024-56637",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56637"
},
{
"name": "CVE-2024-47663",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47663"
},
{
"name": "CVE-2024-40932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40932"
},
{
"name": "CVE-2024-49881",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49881"
},
{
"name": "CVE-2023-52478",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52478"
},
{
"name": "CVE-2024-41006",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41006"
},
{
"name": "CVE-2023-46343",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46343"
},
{
"name": "CVE-2024-46745",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46745"
},
{
"name": "CVE-2024-46819",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46819"
},
{
"name": "CVE-2024-49896",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49896"
},
{
"name": "CVE-2024-40904",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40904"
},
{
"name": "CVE-2024-42084",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42084"
},
{
"name": "CVE-2024-49959",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49959"
},
{
"name": "CVE-2024-49913",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49913"
},
{
"name": "CVE-2024-56691",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56691"
},
{
"name": "CVE-2024-46721",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46721"
},
{
"name": "CVE-2024-50045",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50045"
},
{
"name": "CVE-2024-26805",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26805"
},
{
"name": "CVE-2024-42153",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42153"
},
{
"name": "CVE-2024-46822",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46822"
},
{
"name": "CVE-2024-40960",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40960"
},
{
"name": "CVE-2024-49995",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49995"
},
{
"name": "CVE-2024-56643",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56643"
},
{
"name": "CVE-2025-40570",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40570"
},
{
"name": "CVE-2024-56661",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56661"
},
{
"name": "CVE-2024-49977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49977"
},
{
"name": "CVE-2024-42154",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42154"
},
{
"name": "CVE-2024-49900",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49900"
},
{
"name": "CVE-2024-46685",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46685"
},
{
"name": "CVE-2024-47679",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47679"
},
{
"name": "CVE-2024-36484",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36484"
},
{
"name": "CVE-2024-43889",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43889"
},
{
"name": "CVE-2024-44998",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44998"
},
{
"name": "CVE-2024-46723",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46723"
},
{
"name": "CVE-2024-42229",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42229"
},
{
"name": "CVE-2024-26839",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26839"
},
{
"name": "CVE-2024-46828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46828"
},
{
"name": "CVE-2024-50269",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50269"
},
{
"name": "CVE-2024-53150",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53150"
},
{
"name": "CVE-2024-47735",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47735"
},
{
"name": "CVE-2024-49952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49952"
},
{
"name": "CVE-2024-49981",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49981"
},
{
"name": "CVE-2024-56595",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56595"
},
{
"name": "CVE-2024-42086",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42086"
},
{
"name": "CVE-2024-26581",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26581"
},
{
"name": "CVE-2022-48935",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48935"
},
{
"name": "CVE-2023-52433",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52433"
},
{
"name": "CVE-2024-41007",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41007"
},
{
"name": "CVE-2024-41095",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41095"
},
{
"name": "CVE-2024-56601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56601"
},
{
"name": "CVE-2023-52600",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52600"
},
{
"name": "CVE-2024-53057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53057"
},
{
"name": "CVE-2024-26910",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26910"
},
{
"name": "CVE-2024-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50181"
},
{
"name": "CVE-2023-52507",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52507"
},
{
"name": "CVE-2024-56571",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56571"
},
{
"name": "CVE-2023-52764",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52764"
},
{
"name": "CVE-2023-52587",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52587"
},
{
"name": "CVE-2023-52887",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52887"
},
{
"name": "CVE-2024-46675",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46675"
},
{
"name": "CVE-2024-26645",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26645"
},
{
"name": "CVE-2024-26702",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26702"
},
{
"name": "CVE-2024-46783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46783"
},
{
"name": "CVE-2023-51779",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51779"
},
{
"name": "CVE-2024-42076",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42076"
},
{
"name": "CVE-2024-26673",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26673"
},
{
"name": "CVE-2024-49997",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49997"
},
{
"name": "CVE-2024-42092",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42092"
},
{
"name": "CVE-2024-26720",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26720"
},
{
"name": "CVE-2024-0584",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0584"
},
{
"name": "CVE-2024-42093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42093"
},
{
"name": "CVE-2024-42247",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42247"
},
{
"name": "CVE-2024-43871",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43871"
},
{
"name": "CVE-2024-53066",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53066"
},
{
"name": "CVE-2023-52784",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52784"
},
{
"name": "CVE-2024-43880",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43880"
},
{
"name": "CVE-2024-27413",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27413"
},
{
"name": "CVE-2024-56629",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56629"
},
{
"name": "CVE-2024-50304",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50304"
},
{
"name": "CVE-2024-40959",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40959"
},
{
"name": "CVE-2024-26615",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26615"
},
{
"name": "CVE-2023-52853",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52853"
},
{
"name": "CVE-2024-46689",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46689"
},
{
"name": "CVE-2024-50295",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50295"
},
{
"name": "CVE-2024-26801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26801"
},
{
"name": "CVE-2024-50051",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50051"
},
{
"name": "CVE-2024-41078",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41078"
},
{
"name": "CVE-2024-53063",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53063"
},
{
"name": "CVE-2024-53171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53171"
},
{
"name": "CVE-2024-56602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56602"
},
{
"name": "CVE-2024-46781",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46781"
},
{
"name": "CVE-2024-56770",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56770"
},
{
"name": "CVE-2024-53157",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53157"
},
{
"name": "CVE-2025-30034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30034"
},
{
"name": "CVE-2024-46777",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46777"
},
{
"name": "CVE-2023-52340",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52340"
},
{
"name": "CVE-2024-50199",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50199"
},
{
"name": "CVE-2024-26779",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26779"
},
{
"name": "CVE-2024-40916",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40916"
},
{
"name": "CVE-2024-0193",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0193"
},
{
"name": "CVE-2023-52604",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52604"
},
{
"name": "CVE-2024-50040",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50040"
},
{
"name": "CVE-2024-38586",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38586"
},
{
"name": "CVE-2024-56739",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56739"
},
{
"name": "CVE-2024-50292",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50292"
},
{
"name": "CVE-2024-53103",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53103"
},
{
"name": "CVE-2024-46714",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46714"
},
{
"name": "CVE-2024-40976",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40976"
},
{
"name": "CVE-2024-41081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41081"
},
{
"name": "CVE-2025-40746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40746"
},
{
"name": "CVE-2024-49983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49983"
},
{
"name": "CVE-2023-52601",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52601"
},
{
"name": "CVE-2024-41072",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41072"
},
{
"name": "CVE-2024-44960",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44960"
},
{
"name": "CVE-2024-26773",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26773"
},
{
"name": "CVE-2024-26722",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26722"
},
{
"name": "CVE-2024-54678",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54678"
},
{
"name": "CVE-2024-26598",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26598"
},
{
"name": "CVE-2024-53197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53197"
},
{
"name": "CVE-2024-26679",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26679"
},
{
"name": "CVE-2024-39468",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39468"
},
{
"name": "CVE-2024-26763",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26763"
},
{
"name": "CVE-2024-49889",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49889"
},
{
"name": "CVE-2023-52435",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52435"
},
{
"name": "CVE-2024-40980",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40980"
},
{
"name": "CVE-2023-52654",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52654"
},
{
"name": "CVE-2024-36938",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36938"
},
{
"name": "CVE-2024-40974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40974"
},
{
"name": "CVE-2023-52855",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52855"
},
{
"name": "CVE-2024-56779",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56779"
},
{
"name": "CVE-2024-26749",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26749"
},
{
"name": "CVE-2024-44971",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44971"
},
{
"name": "CVE-2023-52603",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52603"
},
{
"name": "CVE-2024-43894",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43894"
},
{
"name": "CVE-2023-52486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52486"
},
{
"name": "CVE-2024-43867",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43867"
},
{
"name": "CVE-2023-52868",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52868"
},
{
"name": "CVE-2023-52619",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52619"
},
{
"name": "CVE-2023-52796",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52796"
},
{
"name": "CVE-2023-52475",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52475"
},
{
"name": "CVE-2024-50013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50013"
},
{
"name": "CVE-2024-50185",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50185"
},
{
"name": "CVE-2024-53239",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53239"
},
{
"name": "CVE-2023-52617",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52617"
},
{
"name": "CVE-2024-49957",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49957"
},
{
"name": "CVE-2024-49962",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49962"
},
{
"name": "CVE-2024-46731",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46731"
},
{
"name": "CVE-2024-39502",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39502"
},
{
"name": "CVE-2024-46674",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46674"
},
{
"name": "CVE-2023-52836",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52836"
},
{
"name": "CVE-2024-26804",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26804"
},
{
"name": "CVE-2024-26593",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26593"
},
{
"name": "CVE-2024-26751",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26751"
},
{
"name": "CVE-2024-49958",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49958"
},
{
"name": "CVE-2024-50082",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50082"
},
{
"name": "CVE-2024-47723",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47723"
},
{
"name": "CVE-2024-49955",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49955"
},
{
"name": "CVE-2024-42087",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42087"
},
{
"name": "CVE-2024-44944",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44944"
},
{
"name": "CVE-2024-43893",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43893"
},
{
"name": "CVE-2024-50095",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50095"
},
{
"name": "CVE-2024-40983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40983"
},
{
"name": "CVE-2024-50296",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50296"
},
{
"name": "CVE-2024-57874",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57874"
},
{
"name": "CVE-2024-53145",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53145"
},
{
"name": "CVE-2024-50006",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50006"
},
{
"name": "CVE-2022-49034",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49034"
},
{
"name": "CVE-2024-50049",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50049"
},
{
"name": "CVE-2024-27412",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27412"
},
{
"name": "CVE-2024-26636",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26636"
},
{
"name": "CVE-2024-56642",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56642"
},
{
"name": "CVE-2024-50007",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50007"
},
{
"name": "CVE-2024-56586",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56586"
},
{
"name": "CVE-2023-39198",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39198"
},
{
"name": "CVE-2024-40963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40963"
},
{
"name": "CVE-2025-40752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40752"
},
{
"name": "CVE-2024-41041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41041"
},
{
"name": "CVE-2024-50096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50096"
},
{
"name": "CVE-2023-52789",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52789"
},
{
"name": "CVE-2024-49868",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49868"
},
{
"name": "CVE-2024-40947",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40947"
},
{
"name": "CVE-2024-53173",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53173"
},
{
"name": "CVE-2024-50237",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50237"
},
{
"name": "CVE-2023-52867",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52867"
},
{
"name": "CVE-2024-44995",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44995"
},
{
"name": "CVE-2024-46757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46757"
},
{
"name": "CVE-2024-42232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42232"
},
{
"name": "CVE-2024-47699",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47699"
},
{
"name": "CVE-2024-56581",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56581"
},
{
"name": "CVE-2024-46677",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46677"
},
{
"name": "CVE-2024-50059",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50059"
},
{
"name": "CVE-2024-50264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50264"
},
{
"name": "CVE-2024-26606",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26606"
},
{
"name": "CVE-2024-35833",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35833"
},
{
"name": "CVE-2024-41005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41005"
},
{
"name": "CVE-2024-43883",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43883"
},
{
"name": "CVE-2024-56623",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56623"
},
{
"name": "CVE-2024-26625",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26625"
},
{
"name": "CVE-2024-44935",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44935"
},
{
"name": "CVE-2024-44999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44999"
},
{
"name": "CVE-2024-47712",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47712"
},
{
"name": "CVE-2024-56610",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56610"
},
{
"name": "CVE-2024-26748",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26748"
},
{
"name": "CVE-2023-52809",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52809"
},
{
"name": "CVE-2024-42223",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42223"
},
{
"name": "CVE-2024-49963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49963"
},
{
"name": "CVE-2024-49971",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49971"
},
{
"name": "CVE-2024-56562",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56562"
},
{
"name": "CVE-2024-26635",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26635"
},
{
"name": "CVE-2023-52805",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52805"
},
{
"name": "CVE-2024-41097",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41097"
},
{
"name": "CVE-2024-49875",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49875"
},
{
"name": "CVE-2024-47739",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47739"
},
{
"name": "CVE-2024-47705",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47705"
},
{
"name": "CVE-2024-53161",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53161"
},
{
"name": "CVE-2023-52919",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52919"
},
{
"name": "CVE-2024-50035",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50035"
},
{
"name": "CVE-2024-56600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56600"
},
{
"name": "CVE-2024-36978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36978"
},
{
"name": "CVE-2024-44988",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44988"
},
{
"name": "CVE-2024-47660",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47660"
},
{
"name": "CVE-2024-56690",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56690"
},
{
"name": "CVE-2024-56597",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56597"
},
{
"name": "CVE-2024-40905",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40905"
},
{
"name": "CVE-2024-56574",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56574"
},
{
"name": "CVE-2024-47740",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47740"
},
{
"name": "CVE-2024-41063",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41063"
},
{
"name": "CVE-2024-41017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41017"
},
{
"name": "CVE-2024-26697",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26697"
},
{
"name": "CVE-2024-42244",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42244"
},
{
"name": "CVE-2024-49924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49924"
},
{
"name": "CVE-2024-46758",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46758"
},
{
"name": "CVE-2024-53217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53217"
},
{
"name": "CVE-2024-53183",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53183"
},
{
"name": "CVE-2024-49938",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49938"
},
{
"name": "CVE-2024-41012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41012"
},
{
"name": "CVE-2024-40902",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40902"
},
{
"name": "CVE-2024-47756",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47756"
},
{
"name": "CVE-2024-40934",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40934"
},
{
"name": "CVE-2024-47667",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47667"
},
{
"name": "CVE-2024-46756",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46756"
},
{
"name": "CVE-2024-56615",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56615"
},
{
"name": "CVE-2024-47737",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47737"
},
{
"name": "CVE-2024-46739",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46739"
},
{
"name": "CVE-2024-47669",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47669"
},
{
"name": "CVE-2024-56705",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56705"
},
{
"name": "CVE-2024-50290",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50290"
},
{
"name": "CVE-2024-50008",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50008"
},
{
"name": "CVE-2024-42082",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42082"
},
{
"name": "CVE-2024-26685",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26685"
},
{
"name": "CVE-2024-56704",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56704"
},
{
"name": "CVE-2024-45006",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45006"
},
{
"name": "CVE-2024-46725",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46725"
},
{
"name": "CVE-2024-46829",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46829"
},
{
"name": "CVE-2024-40912",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40912"
},
{
"name": "CVE-2023-52599",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52599"
},
{
"name": "CVE-2024-56589",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56589"
},
{
"name": "CVE-2024-50265",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50265"
},
{
"name": "CVE-2024-56636",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56636"
},
{
"name": "CVE-2024-41089",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41089"
},
{
"name": "CVE-2024-39487",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39487"
},
{
"name": "CVE-2024-56567",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56567"
},
{
"name": "CVE-2024-44954",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44954"
},
{
"name": "CVE-2024-43908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43908"
},
{
"name": "CVE-2023-3567",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3567"
},
{
"name": "CVE-2024-50033",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50033"
},
{
"name": "CVE-2024-43890",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43890"
},
{
"name": "CVE-2024-26688",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26688"
},
{
"name": "CVE-2023-52865",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52865"
},
{
"name": "CVE-2024-49901",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49901"
},
{
"name": "CVE-2024-36901",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36901"
},
{
"name": "CVE-2024-56688",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56688"
},
{
"name": "CVE-2024-41090",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41090"
},
{
"name": "CVE-2024-50180",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50180"
},
{
"name": "CVE-2024-26663",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26663"
},
{
"name": "CVE-2024-50282",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50282"
},
{
"name": "CVE-2024-50273",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50273"
},
{
"name": "CVE-2024-26675",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26675"
},
{
"name": "CVE-2024-56532",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56532"
},
{
"name": "CVE-2024-41077",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41077"
},
{
"name": "CVE-2024-47143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47143"
},
{
"name": "CVE-2024-49949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49949"
},
{
"name": "CVE-2023-52509",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52509"
},
{
"name": "CVE-2024-44952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44952"
},
{
"name": "CVE-2023-52753",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52753"
},
{
"name": "CVE-2024-26840",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26840"
},
{
"name": "CVE-2024-50046",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50046"
},
{
"name": "CVE-2023-52583",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52583"
},
{
"name": "CVE-2024-50099",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50099"
},
{
"name": "CVE-2024-50193",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50193"
},
{
"name": "CVE-2024-46743",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46743"
},
{
"name": "CVE-2024-49944",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49944"
},
{
"name": "CVE-2023-52602",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52602"
},
{
"name": "CVE-2024-50198",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50198"
},
{
"name": "CVE-2023-52832",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52832"
},
{
"name": "CVE-2024-56746",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56746"
},
{
"name": "CVE-2024-47749",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47749"
},
{
"name": "CVE-2024-41092",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41092"
},
{
"name": "CVE-2024-49966",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49966"
},
{
"name": "CVE-2024-40995",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40995"
},
{
"name": "CVE-2024-41087",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41087"
},
{
"name": "CVE-2023-52819",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52819"
},
{
"name": "CVE-2023-52876",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52876"
},
{
"name": "CVE-2024-42095",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42095"
},
{
"name": "CVE-2024-49902",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49902"
},
{
"name": "CVE-2024-47757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47757"
},
{
"name": "CVE-2025-30033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30033"
},
{
"name": "CVE-2024-27417",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27417"
},
{
"name": "CVE-2024-48881",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-48881"
},
{
"name": "CVE-2024-47692",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47692"
},
{
"name": "CVE-2024-46744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46744"
},
{
"name": "CVE-2024-0841",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0841"
},
{
"name": "CVE-2025-40753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40753"
},
{
"name": "CVE-2024-50184",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50184"
},
{
"name": "CVE-2024-40929",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40929"
},
{
"name": "CVE-2024-39501",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39501"
},
{
"name": "CVE-2024-52504",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52504"
},
{
"name": "CVE-2024-50287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50287"
},
{
"name": "CVE-2024-56747",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56747"
},
{
"name": "CVE-2024-49851",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49851"
},
{
"name": "CVE-2023-6040",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6040"
},
{
"name": "CVE-2023-52510",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52510"
},
{
"name": "CVE-2023-51781",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51781"
},
{
"name": "CVE-2024-56603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56603"
},
{
"name": "CVE-2024-53158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53158"
},
{
"name": "CVE-2024-43882",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43882"
},
{
"name": "CVE-2024-41068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41068"
},
{
"name": "CVE-2024-56644",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56644"
},
{
"name": "CVE-2024-46780",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46780"
},
{
"name": "CVE-2024-46817",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46817"
},
{
"name": "CVE-2024-42101",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42101"
},
{
"name": "CVE-2025-40751",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40751"
},
{
"name": "CVE-2024-50278",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50278"
},
{
"name": "CVE-2024-50201",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50201"
},
{
"name": "CVE-2024-35835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35835"
},
{
"name": "CVE-2024-56701",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56701"
},
{
"name": "CVE-2024-42077",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42077"
},
{
"name": "CVE-2023-52670",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52670"
},
{
"name": "CVE-2024-40943",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40943"
},
{
"name": "CVE-2024-26735",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26735"
},
{
"name": "CVE-2024-49933",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49933"
},
{
"name": "CVE-2024-53184",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53184"
},
{
"name": "CVE-2024-47685",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47685"
},
{
"name": "CVE-2024-40901",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40901"
},
{
"name": "CVE-2022-48829",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48829"
},
{
"name": "CVE-2024-53174",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53174"
},
{
"name": "CVE-2024-49879",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49879"
},
{
"name": "CVE-2024-39495",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39495"
},
{
"name": "CVE-2024-50044",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50044"
},
{
"name": "CVE-2024-49894",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49894"
},
{
"name": "CVE-2024-56700",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56700"
},
{
"name": "CVE-2024-47718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47718"
},
{
"name": "CVE-2024-49867",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49867"
},
{
"name": "CVE-2023-51780",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51780"
},
{
"name": "CVE-2024-49985",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49985"
},
{
"name": "CVE-2024-50001",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50001"
},
{
"name": "CVE-2023-52881",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52881"
},
{
"name": "CVE-2024-49993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49993"
},
{
"name": "CVE-2024-56728",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56728"
},
{
"name": "CVE-2024-43861",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43861"
},
{
"name": "CVE-2024-53241",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53241"
},
{
"name": "CVE-2023-52838",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52838"
},
{
"name": "CVE-2024-47710",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47710"
},
{
"name": "CVE-2024-46771",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46771"
},
{
"name": "CVE-2024-50083",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50083"
},
{
"name": "CVE-2023-52774",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52774"
},
{
"name": "CVE-2024-56531",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56531"
},
{
"name": "CVE-2024-49892",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49892"
},
{
"name": "CVE-2024-49930",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49930"
},
{
"name": "CVE-2024-53148",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53148"
},
{
"name": "CVE-2024-47698",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47698"
},
{
"name": "CVE-2023-52879",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52879"
},
{
"name": "CVE-2024-56681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56681"
},
{
"name": "CVE-2024-26602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26602"
},
{
"name": "CVE-2023-52799",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52799"
},
{
"name": "CVE-2024-38619",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38619"
},
{
"name": "CVE-2024-50039",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50039"
},
{
"name": "CVE-2024-50251",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50251"
},
{
"name": "CVE-2024-56754",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56754"
},
{
"name": "CVE-2024-49973",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49973"
},
{
"name": "CVE-2024-53214",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53214"
},
{
"name": "CVE-2024-39476",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39476"
},
{
"name": "CVE-2024-46804",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46804"
},
{
"name": "CVE-2024-56619",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56619"
},
{
"name": "CVE-2024-47668",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47668"
},
{
"name": "CVE-2024-49883",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49883"
},
{
"name": "CVE-2024-53165",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53165"
},
{
"name": "CVE-2024-50236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50236"
},
{
"name": "CVE-2024-46840",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46840"
},
{
"name": "CVE-2022-48828",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48828"
},
{
"name": "CVE-2024-56568",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56568"
},
{
"name": "CVE-2024-46763",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46763"
},
{
"name": "CVE-2024-41059",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41059"
},
{
"name": "CVE-2024-42094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42094"
},
{
"name": "CVE-2024-53146",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53146"
},
{
"name": "CVE-2024-46759",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46759"
},
{
"name": "CVE-2024-27416",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27416"
},
{
"name": "CVE-2023-52598",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52598"
},
{
"name": "CVE-2024-46737",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46737"
},
{
"name": "CVE-2024-41040",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41040"
},
{
"name": "CVE-2023-6606",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6606"
},
{
"name": "CVE-2024-40987",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40987"
},
{
"name": "CVE-2024-56539",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56539"
},
{
"name": "CVE-2023-52806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52806"
},
{
"name": "CVE-2024-56662",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56662"
},
{
"name": "CVE-2024-46814",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46814"
},
{
"name": "CVE-2024-56572",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56572"
},
{
"name": "CVE-2024-56570",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56570"
},
{
"name": "CVE-2024-26793",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26793"
},
{
"name": "CVE-2024-40945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40945"
},
{
"name": "CVE-2024-46818",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46818"
},
{
"name": "CVE-2023-6932",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6932"
},
{
"name": "CVE-2024-50602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50602"
},
{
"name": "CVE-2024-40941",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40941"
},
{
"name": "CVE-2022-48827",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48827"
},
{
"name": "CVE-2023-52594",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52594"
},
{
"name": "CVE-2024-53198",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53198"
},
{
"name": "CVE-2024-44965",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44965"
},
{
"name": "CVE-2024-49860",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49860"
},
{
"name": "CVE-2024-45003",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45003"
},
{
"name": "CVE-2024-41055",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41055"
},
{
"name": "CVE-2023-52595",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52595"
},
{
"name": "CVE-2025-47809",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47809"
},
{
"name": "CVE-2024-50234",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50234"
},
{
"name": "CVE-2024-56720",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56720"
},
{
"name": "CVE-2024-26752",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26752"
},
{
"name": "CVE-2024-41015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41015"
},
{
"name": "CVE-2024-53155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53155"
},
{
"name": "CVE-2024-40984",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40984"
},
{
"name": "CVE-2024-42224",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42224"
},
{
"name": "CVE-2024-50194",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50194"
},
{
"name": "CVE-2024-46832",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46832"
},
{
"name": "CVE-2023-52871",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52871"
},
{
"name": "CVE-2024-49895",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49895"
},
{
"name": "CVE-2024-56785",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56785"
},
{
"name": "CVE-2023-52623",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52623"
},
{
"name": "CVE-2024-26736",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26736"
},
{
"name": "CVE-2024-56587",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56587"
},
{
"name": "CVE-2024-45021",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45021"
},
{
"name": "CVE-2023-52655",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52655"
},
{
"name": "CVE-2024-49882",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49882"
},
{
"name": "CVE-2024-47659",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47659"
},
{
"name": "CVE-2024-42161",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42161"
},
{
"name": "CVE-2023-52813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52813"
},
{
"name": "CVE-2024-56741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56741"
},
{
"name": "CVE-2023-52504",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52504"
},
{
"name": "CVE-2024-39506",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39506"
},
{
"name": "CVE-2024-40990",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40990"
},
{
"name": "CVE-2024-40978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40978"
},
{
"name": "CVE-2024-53104",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53104"
},
{
"name": "CVE-2023-52615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52615"
},
{
"name": "CVE-2024-40968",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40968"
},
{
"name": "CVE-2024-45025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45025"
},
{
"name": "CVE-2024-27414",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27414"
},
{
"name": "CVE-2024-56748",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56748"
},
{
"name": "CVE-2024-41035",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41035"
},
{
"name": "CVE-2024-56648",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56648"
},
{
"name": "CVE-2024-26777",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26777"
},
{
"name": "CVE-2024-41049",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41049"
},
{
"name": "CVE-2024-26764",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26764"
},
{
"name": "CVE-2024-42143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42143"
},
{
"name": "CVE-2021-47316",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47316"
},
{
"name": "CVE-2024-56558",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56558"
},
{
"name": "CVE-2024-41065",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41065"
},
{
"name": "CVE-2024-43879",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43879"
},
{
"name": "CVE-2024-46761",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46761"
},
{
"name": "CVE-2023-52606",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52606"
},
{
"name": "CVE-2024-50301",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50301"
},
{
"name": "CVE-2024-26778",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26778"
},
{
"name": "CVE-2024-37078",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37078"
},
{
"name": "CVE-2024-49975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49975"
},
{
"name": "CVE-2024-53240",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53240"
},
{
"name": "CVE-2024-50179",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50179"
},
{
"name": "CVE-2024-53101",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53101"
},
{
"name": "CVE-2024-47696",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47696"
},
{
"name": "CVE-2023-52840",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52840"
},
{
"name": "CVE-2024-53156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53156"
},
{
"name": "CVE-2023-52502",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52502"
},
{
"name": "CVE-2024-41091",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41091"
},
{
"name": "CVE-2024-42105",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42105"
},
{
"name": "CVE-2024-50015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50015"
},
{
"name": "CVE-2023-52597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52597"
},
{
"name": "CVE-2024-41044",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41044"
},
{
"name": "CVE-2024-40958",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40958"
},
{
"name": "CVE-2023-52581",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52581"
},
{
"name": "CVE-2024-45008",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45008"
},
{
"name": "CVE-2024-50188",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50188"
},
{
"name": "CVE-2024-56533",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56533"
},
{
"name": "CVE-2024-40981",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40981"
},
{
"name": "CVE-2023-52917",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52917"
},
{
"name": "CVE-2024-56598",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56598"
},
{
"name": "CVE-2024-1086",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1086"
},
{
"name": "CVE-2024-53060",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53060"
},
{
"name": "CVE-2023-52875",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52875"
},
{
"name": "CVE-2024-44990",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44990"
},
{
"name": "CVE-2024-44987",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44987"
},
{
"name": "CVE-2024-56781",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56781"
},
{
"name": "CVE-2024-41046",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41046"
},
{
"name": "CVE-2024-50089",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50089"
},
{
"name": "CVE-2024-56630",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56630"
},
{
"name": "CVE-2024-42152",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42152"
},
{
"name": "CVE-2024-49982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49982"
},
{
"name": "CVE-2023-52835",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52835"
},
{
"name": "CVE-2024-53059",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53059"
},
{
"name": "CVE-2024-50299",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50299"
},
{
"name": "CVE-2024-50218",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50218"
},
{
"name": "CVE-2024-42148",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42148"
},
{
"name": "CVE-2024-39482",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39482"
},
{
"name": "CVE-2024-39499",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39499"
},
{
"name": "CVE-2024-56633",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56633"
},
{
"name": "CVE-2024-56593",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56593"
},
{
"name": "CVE-2024-56605",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56605"
},
{
"name": "CVE-2024-53680",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53680"
},
{
"name": "CVE-2024-26835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26835"
},
{
"name": "CVE-2024-26791",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26791"
},
{
"name": "CVE-2023-52843",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52843"
},
{
"name": "CVE-2024-50279",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50279"
},
{
"name": "CVE-2024-41064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41064"
},
{
"name": "CVE-2024-36894",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36894"
},
{
"name": "CVE-2024-56698",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56698"
},
{
"name": "CVE-2024-47742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47742"
},
{
"name": "CVE-2024-47709",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47709"
},
{
"name": "CVE-2024-41020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41020"
},
{
"name": "CVE-2024-26772",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26772"
},
{
"name": "CVE-2024-46782",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46782"
},
{
"name": "CVE-2024-56780",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56780"
},
{
"name": "CVE-2024-47706",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47706"
},
{
"name": "CVE-2024-27405",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27405"
},
{
"name": "CVE-2024-46702",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46702"
},
{
"name": "CVE-2023-5717",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5717"
},
{
"name": "CVE-2024-47747",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47747"
},
{
"name": "CVE-2024-40942",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40942"
},
{
"name": "CVE-2024-26766",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26766"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2024-26664",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26664"
},
{
"name": "CVE-2024-46719",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46719"
},
{
"name": "CVE-2024-49877",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49877"
},
{
"name": "CVE-2023-52791",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52791"
},
{
"name": "CVE-2024-44949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44949"
},
{
"name": "CVE-2023-6121",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6121"
},
{
"name": "CVE-2023-52607",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52607"
},
{
"name": "CVE-2024-56650",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56650"
},
{
"name": "CVE-2024-44989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44989"
},
{
"name": "CVE-2024-26788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26788"
},
{
"name": "CVE-2023-52817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52817"
},
{
"name": "CVE-2024-27410",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27410"
},
{
"name": "CVE-2024-26684",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26684"
},
{
"name": "CVE-2024-53237",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53237"
},
{
"name": "CVE-2023-6931",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6931"
},
{
"name": "CVE-2024-56576",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56576"
},
{
"name": "CVE-2024-42145",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42145"
},
{
"name": "CVE-2024-40961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40961"
},
{
"name": "CVE-2024-53227",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53227"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0677",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-08-12T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Siemens. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Siemens",
"vendor_advisories": [
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-707630",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-707630.html"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-331739",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-331739.html"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-693808",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-693808.html"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-613116",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-613116.html"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-493396",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-493396.html"
},
{
"published_at": "2025-08-11",
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-400089",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-400089.html"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-493787",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-493787.html"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-894058",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-894058.html"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-355557",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-355557.html"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-529291",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-529291.html"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-282044",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-282044.html"
}
]
}
CERTFR-2024-AVI-0301
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Certaines d'entre elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, une exécution de code arbitraire et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 18.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 20.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 14.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 23.10",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 22.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-52436",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52436"
},
{
"name": "CVE-2023-3006",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3006"
},
{
"name": "CVE-2023-52448",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52448"
},
{
"name": "CVE-2023-52456",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52456"
},
{
"name": "CVE-2023-46838",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46838"
},
{
"name": "CVE-2024-26586",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26586"
},
{
"name": "CVE-2023-52429",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52429"
},
{
"name": "CVE-2023-1194",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1194"
},
{
"name": "CVE-2023-2002",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2002"
},
{
"name": "CVE-2023-52480",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52480"
},
{
"name": "CVE-2024-26589",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26589"
},
{
"name": "CVE-2024-26597",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26597"
},
{
"name": "CVE-2024-24855",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24855"
},
{
"name": "CVE-2023-52441",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52441"
},
{
"name": "CVE-2023-52454",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52454"
},
{
"name": "CVE-2023-23000",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23000"
},
{
"name": "CVE-2024-26631",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26631"
},
{
"name": "CVE-2023-52340",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52340"
},
{
"name": "CVE-2024-26598",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26598"
},
{
"name": "CVE-2023-52435",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52435"
},
{
"name": "CVE-2023-32254",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32254"
},
{
"name": "CVE-2023-52462",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52462"
},
{
"name": "CVE-2023-52609",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52609"
},
{
"name": "CVE-2023-52469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52469"
},
{
"name": "CVE-2023-52451",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52451"
},
{
"name": "CVE-2024-0607",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0607"
},
{
"name": "CVE-2024-24860",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24860"
},
{
"name": "CVE-2023-38430",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38430"
},
{
"name": "CVE-2023-52438",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52438"
},
{
"name": "CVE-2023-32258",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32258"
},
{
"name": "CVE-2023-52439",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52439"
},
{
"name": "CVE-2023-52470",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52470"
},
{
"name": "CVE-2023-52445",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52445"
},
{
"name": "CVE-2024-23850",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23850"
},
{
"name": "CVE-2024-0775",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0775"
},
{
"name": "CVE-2023-51781",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51781"
},
{
"name": "CVE-2023-52612",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52612"
},
{
"name": "CVE-2023-52434",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52434"
},
{
"name": "CVE-2024-23851",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23851"
},
{
"name": "CVE-2023-3867",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3867"
},
{
"name": "CVE-2023-50431",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50431"
},
{
"name": "CVE-2023-52458",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52458"
},
{
"name": "CVE-2023-34256",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34256"
},
{
"name": "CVE-2024-26633",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26633"
},
{
"name": "CVE-2024-26591",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26591"
},
{
"name": "CVE-2023-52464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52464"
},
{
"name": "CVE-2023-52610",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52610"
},
{
"name": "CVE-2023-4132",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4132"
},
{
"name": "CVE-2023-38427",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38427"
},
{
"name": "CVE-2024-1086",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1086"
},
{
"name": "CVE-2023-52463",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52463"
},
{
"name": "CVE-2023-52467",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52467"
},
{
"name": "CVE-2023-39197",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39197"
},
{
"name": "CVE-2023-52443",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52443"
},
{
"name": "CVE-2023-52442",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52442"
},
{
"name": "CVE-2024-22705",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22705"
},
{
"name": "CVE-2023-38431",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38431"
},
{
"name": "CVE-2023-6121",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6121"
},
{
"name": "CVE-2023-6610",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6610"
},
{
"name": "CVE-2023-52457",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52457"
},
{
"name": "CVE-2023-52449",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52449"
},
{
"name": "CVE-2023-52444",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52444"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0301",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-04-12T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003ele noyau Linux d\u0027Ubuntu\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9\ndes donn\u00e9es, une ex\u00e9cution de code arbitraire et une \u00e9l\u00e9vation de\nprivil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-6726-1 du 09 avril 2024",
"url": "https://ubuntu.com/security/notices/USN-6726-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-6725-1 du 09 avril 2024",
"url": "https://ubuntu.com/security/notices/USN-6725-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-6701-4 du 09 avril 2024",
"url": "https://ubuntu.com/security/notices/USN-6701-4"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-6724-1 du 09 avril 2024",
"url": "https://ubuntu.com/security/notices/USN-6724-1"
}
]
}
CERTFR-2024-AVI-0902
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Red Hat. Certaines d'entre elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, une atteinte à l'intégrité des données et un contournement de la politique de sécurité.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Red Hat | N/A | Red Hat Enterprise Linux for x86_64 9 x86_64 | ||
| Red Hat | N/A | Red Hat Enterprise Linux for Power, little endian 9 ppc64le | ||
| Red Hat | N/A | Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.4 ppc64le | ||
| Red Hat | N/A | Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.4 ppc64le | ||
| Red Hat | N/A | Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.4 x86_64 | ||
| Red Hat | N/A | Red Hat Enterprise Linux for Real Time for NFV for x86_64 - 4 years of updates 9.4 x86_64 | ||
| Red Hat | N/A | Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.2 x86_64 | ||
| Red Hat | N/A | Red Hat Enterprise Linux Server - AUS 8.6 x86_64 | ||
| Red Hat | N/A | Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 9.4 aarch64 | ||
| Red Hat | N/A | Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.4 x86_64 | ||
| Red Hat | N/A | Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.2 x86_64 | ||
| Red Hat | N/A | Red Hat Enterprise Linux Server - TUS 8.6 x86_64 | ||
| Red Hat | N/A | Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.4 s390x | ||
| Red Hat | N/A | Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 9.4 x86_64 | ||
| Red Hat | N/A | Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.4 aarch64 | ||
| Red Hat | N/A | Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 9.2 s390x | ||
| Red Hat | N/A | Red Hat Enterprise Linux Server - AUS 9.4 x86_64 | ||
| Red Hat | N/A | Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6 x86_64 | ||
| Red Hat | N/A | Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.2 ppc64le | ||
| Red Hat | N/A | Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.4 s390x | ||
| Red Hat | N/A | Red Hat Enterprise Linux for ARM 64 9 aarch64 | ||
| Red Hat | N/A | Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.2 ppc64le | ||
| Red Hat | N/A | Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6 ppc64le | ||
| Red Hat | N/A | Red Hat Enterprise Linux for Real Time 9 x86_64 | ||
| Red Hat | N/A | Red Hat Enterprise Linux for Real Time for x86_64 - 4 years of updates 9.2 x86_64 | ||
| Red Hat | N/A | Red Hat Enterprise Linux Server - AUS 9.2 x86_64 | ||
| Red Hat | N/A | Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 9.4 ppc64le | ||
| Red Hat | N/A | Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.2 aarch64 | ||
| Red Hat | N/A | Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.2 s390x | ||
| Red Hat | N/A | Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 9.2 aarch64 | ||
| Red Hat | N/A | Red Hat CodeReady Linux Builder for Power, little endian 9 ppc64le | ||
| Red Hat | N/A | Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 9.4 s390x | ||
| Red Hat | N/A | Red Hat Enterprise Linux for IBM z Systems 9 s390x | ||
| Red Hat | N/A | Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 9.2 x86_64 | ||
| Red Hat | N/A | Red Hat CodeReady Linux Builder for x86_64 9 x86_64 | ||
| Red Hat | N/A | Red Hat Enterprise Linux for Real Time for x86_64 - 4 years of updates 9.4 x86_64 | ||
| Red Hat | N/A | Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.2 s390x | ||
| Red Hat | N/A | Red Hat CodeReady Linux Builder for ARM 64 9 aarch64 | ||
| Red Hat | N/A | Red Hat CodeReady Linux Builder for IBM z Systems 9 s390x | ||
| Red Hat | N/A | Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.4 aarch64 | ||
| Red Hat | N/A | Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 9.2 ppc64le | ||
| Red Hat | N/A | Red Hat Enterprise Linux for Real Time for NFV 9 x86_64 | ||
| Red Hat | N/A | Red Hat Enterprise Linux for Real Time for NFV for x86_64 - 4 years of updates 9.2 x86_64 | ||
| Red Hat | N/A | Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.2 aarch64 |
| Title | Publication Time | Tags | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Red Hat Enterprise Linux for x86_64 9 x86_64",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian 9 ppc64le",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.4 ppc64le",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.4 ppc64le",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.4 x86_64",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time for NFV for x86_64 - 4 years of updates 9.4 x86_64",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.2 x86_64",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 8.6 x86_64",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 9.4 aarch64",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.4 x86_64",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.2 x86_64",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - TUS 8.6 x86_64",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.4 s390x",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 9.4 x86_64",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.4 aarch64",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 9.2 s390x",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 9.4 x86_64",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6 x86_64",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.2 ppc64le",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.4 s390x",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 9 aarch64",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.2 ppc64le",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6 ppc64le",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time 9 x86_64",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time for x86_64 - 4 years of updates 9.2 x86_64",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 9.2 x86_64",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 9.4 ppc64le",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.2 aarch64",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.2 s390x",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 9.2 aarch64",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for Power, little endian 9 ppc64le",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 9.4 s390x",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems 9 s390x",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 9.2 x86_64",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for x86_64 9 x86_64",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time for x86_64 - 4 years of updates 9.4 x86_64",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.2 s390x",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for ARM 64 9 aarch64",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for IBM z Systems 9 s390x",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.4 aarch64",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 9.2 ppc64le",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time for NFV 9 x86_64",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time for NFV for x86_64 - 4 years of updates 9.2 x86_64",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.2 aarch64",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-36889",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36889"
},
{
"name": "CVE-2024-42284",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42284"
},
{
"name": "CVE-2024-26830",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26830"
},
{
"name": "CVE-2023-28746",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28746"
},
{
"name": "CVE-2024-27403",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27403"
},
{
"name": "CVE-2024-38556",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38556"
},
{
"name": "CVE-2024-40959",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40959"
},
{
"name": "CVE-2024-41056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41056"
},
{
"name": "CVE-2024-26598",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26598"
},
{
"name": "CVE-2021-47560",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47560"
},
{
"name": "CVE-2021-47385",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47385"
},
{
"name": "CVE-2024-39502",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39502"
},
{
"name": "CVE-2024-42079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42079"
},
{
"name": "CVE-2024-39472",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39472"
},
{
"name": "CVE-2024-36978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36978"
},
{
"name": "CVE-2024-41066",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41066"
},
{
"name": "CVE-2024-42090",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42090"
},
{
"name": "CVE-2024-36244",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36244"
},
{
"name": "CVE-2024-42272",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42272"
},
{
"name": "CVE-2024-35989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35989"
},
{
"name": "CVE-2023-52658",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52658"
},
{
"name": "CVE-2024-35884",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35884"
},
{
"name": "CVE-2024-39483",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39483"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0902",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-10-18T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de Red Hat. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et un contournement de la politique de s\u00e9curit\u00e9.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Red Hat",
"vendor_advisories": [
{
"published_at": "2024-10-16",
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2024:8161",
"url": "https://access.redhat.com/errata/RHSA-2024:8161"
},
{
"published_at": "2024-10-16",
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2024:8157",
"url": "https://access.redhat.com/errata/RHSA-2024:8157"
},
{
"published_at": "2024-10-16",
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2024:8158",
"url": "https://access.redhat.com/errata/RHSA-2024:8158"
},
{
"published_at": "2024-10-16",
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2024:8162",
"url": "https://access.redhat.com/errata/RHSA-2024:8162"
}
]
}
CERTFR-2024-AVI-0577
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Red Hat. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 8.6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian 8 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems 8 s390x | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 8 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - TUS 8.6 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for IBM z Systems 9 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.0 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time 8 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 9.4 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server for ARM 64 - 4 years of updates 9.0 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.4 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time for x86_64 - 4 years of updates 9.0 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server for ARM 64 - 4 years of updates 9.4 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 9 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.4 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 9.4 s390x | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for Power, little endian 9 ppc64le | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 9.4 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time 9 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for ARM 64 9 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.4 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.0 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time for NFV for x86_64 - 4 years of updates 9.0 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 8 aarch64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for ARM 64 8 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.4 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time for NFV 9 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time for NFV 8 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 9.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time for x86_64 - 4 years of updates 9.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server for IBM z Systems - 4 years of updates 9.0 s390x | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for x86_64 8 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems 9 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time for NFV for x86_64 - 4 years of updates 9.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian 9 ppc64le | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 9.4 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for Power, little endian 8 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server for IBM z Systems - 4 years of updates 9.4 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.4 ppc64le | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for x86_64 9 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 9 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6 x86_64 |
| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Red Hat Enterprise Linux Server - AUS 8.6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian 8 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems 8 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 8 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - TUS 8.6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for IBM z Systems 9 s390x",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.0 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time 8 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 9.4 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server for ARM 64 - 4 years of updates 9.0 aarch64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.4 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time for x86_64 - 4 years of updates 9.0 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server for ARM 64 - 4 years of updates 9.4 aarch64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 9 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 9.4 s390x",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for Power, little endian 9 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 9.4 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time 9 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for ARM 64 9 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.4 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.0 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time for NFV for x86_64 - 4 years of updates 9.0 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 8 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for ARM 64 8 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.4 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time for NFV 9 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time for NFV 8 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 9.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time for x86_64 - 4 years of updates 9.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server for IBM z Systems - 4 years of updates 9.0 s390x",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for x86_64 8 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems 9 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time for NFV for x86_64 - 4 years of updates 9.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian 9 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 9.4 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for Power, little endian 8 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server for IBM z Systems - 4 years of updates 9.4 s390x",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.4 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for x86_64 9 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 9 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2023-52675",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52675"
},
{
"name": "CVE-2024-26656",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26656"
},
{
"name": "CVE-2024-26974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26974"
},
{
"name": "CVE-2024-26585",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26585"
},
{
"name": "CVE-2024-27397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27397"
},
{
"name": "CVE-2024-35854",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35854"
},
{
"name": "CVE-2023-52878",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52878"
},
{
"name": "CVE-2024-36886",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36886"
},
{
"name": "CVE-2023-52669",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52669"
},
{
"name": "CVE-2024-36004",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36004"
},
{
"name": "CVE-2024-26859",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26859"
},
{
"name": "CVE-2024-35959",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35959"
},
{
"name": "CVE-2024-26673",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26673"
},
{
"name": "CVE-2024-35855",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35855"
},
{
"name": "CVE-2024-26801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26801"
},
{
"name": "CVE-2024-36007",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36007"
},
{
"name": "CVE-2021-47311",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47311"
},
{
"name": "CVE-2024-0193",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0193"
},
{
"name": "CVE-2024-36952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36952"
},
{
"name": "CVE-2024-26598",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26598"
},
{
"name": "CVE-2024-35852",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35852"
},
{
"name": "CVE-2023-52781",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52781"
},
{
"name": "CVE-2024-35845",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35845"
},
{
"name": "CVE-2021-47073",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47073"
},
{
"name": "CVE-2021-47293",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47293"
},
{
"name": "CVE-2024-26804",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26804"
},
{
"name": "CVE-2023-52686",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52686"
},
{
"name": "CVE-2024-36005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36005"
},
{
"name": "CVE-2024-27393",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27393"
},
{
"name": "CVE-2021-47236",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47236"
},
{
"name": "CVE-2024-35890",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35890"
},
{
"name": "CVE-2023-52877",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52877"
},
{
"name": "CVE-2021-47400",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47400"
},
{
"name": "CVE-2024-26826",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26826"
},
{
"name": "CVE-2024-26583",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26583"
},
{
"name": "CVE-2024-35888",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35888"
},
{
"name": "CVE-2023-52700",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52700"
},
{
"name": "CVE-2021-47495",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47495"
},
{
"name": "CVE-2024-26675",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26675"
},
{
"name": "CVE-2024-26906",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26906"
},
{
"name": "CVE-2024-26584",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26584"
},
{
"name": "CVE-2024-35870",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35870"
},
{
"name": "CVE-2024-35969",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35969"
},
{
"name": "CVE-2024-35835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35835"
},
{
"name": "CVE-2024-26735",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26735"
},
{
"name": "CVE-2023-52881",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52881"
},
{
"name": "CVE-2023-52434",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52434"
},
{
"name": "CVE-2021-46972",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46972"
},
{
"name": "CVE-2022-1789",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1789"
},
{
"name": "CVE-2023-52667",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52667"
},
{
"name": "CVE-2023-52703",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52703"
},
{
"name": "CVE-2024-26759",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26759"
},
{
"name": "CVE-2023-52464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52464"
},
{
"name": "CVE-2023-52813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52813"
},
{
"name": "CVE-2024-35838",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35838"
},
{
"name": "CVE-2023-52615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52615"
},
{
"name": "CVE-2023-52560",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52560"
},
{
"name": "CVE-2021-47069",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47069"
},
{
"name": "CVE-2024-35960",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35960"
},
{
"name": "CVE-2020-26555",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26555"
},
{
"name": "CVE-2024-35789",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35789"
},
{
"name": "CVE-2023-52835",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52835"
},
{
"name": "CVE-2024-26982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26982"
},
{
"name": "CVE-2021-47310",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47310"
},
{
"name": "CVE-2023-52626",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52626"
},
{
"name": "CVE-2024-35958",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35958"
},
{
"name": "CVE-2021-47456",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47456"
},
{
"name": "CVE-2021-47356",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47356"
},
{
"name": "CVE-2021-47353",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47353"
},
{
"name": "CVE-2023-5090",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5090"
},
{
"name": "CVE-2024-27410",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27410"
},
{
"name": "CVE-2021-46909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46909"
},
{
"name": "CVE-2024-35853",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35853"
},
{
"name": "CVE-2024-26907",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26907"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0577",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-07-12T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de Red Hat. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Red Hat",
"vendor_advisories": [
{
"published_at": "2024-07-10",
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2024:4447",
"url": "https://access.redhat.com/errata/RHSA-2024:4447"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2024:4412",
"url": "https://access.redhat.com/errata/RHSA-2024:4412"
},
{
"published_at": "2024-07-02",
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2024:4211",
"url": "https://access.redhat.com/errata/RHSA-2024:4211"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2024:4415",
"url": "https://access.redhat.com/errata/RHSA-2024:4415"
},
{
"published_at": "2024-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2024:4352",
"url": "https://access.redhat.com/errata/RHSA-2024:4352"
},
{
"published_at": "2024-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2024:4349",
"url": "https://access.redhat.com/errata/RHSA-2024:4349"
}
]
}
CERTFR-2025-AVI-0677
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Siemens. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Siemens | N/A | SIMATIC PCS neo V6.0 versions antérieures à V6.0 SP1 | ||
| Siemens | N/A | SIMATIC WinCC V17, v18 et V20 toutes versions pour les vulnérabilités CVE-2024-54678 et CVE-2025-40759 | ||
| Siemens | N/A | SIMATIC Control Function Library (CFL) toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIPROTEC 5 versions antérieures à 10.0 | ||
| Siemens | N/A | SIMATIC MTP Integrator toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC ProSave V17 toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC WinCC Unified Line Coordination toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC WinCC TeleControl toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC WinCC OA V3.19 versions antérieures à V3.19 P020 | ||
| Siemens | N/A | SIMATIC WinCC flexible ES toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC S7-PLCSIM V17 toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2024-54678. | ||
| Siemens | N/A | SIMATIC S7-Fail-safe Configuration Tool (S7-FCT) versions antérieures à 4.0.1 | ||
| Siemens | N/A | SIMATIC PCS neo V6.0 toutes versions pour la vulnérabilité CVE-2024-54678 | ||
| Siemens | N/A | SIMATIC eaSie Core Package (6DL5424-0AX00-0AV8) toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC MTP CREATOR V2.x et V3.x toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2025-30033. | ||
| Siemens | N/A | SIMATIC WinCC OA V3.18 versions antérieures à V3.18 P032 | ||
| Siemens | N/A | TIA Portal Cloud V19 versions antérieures à 5.2.1.1 | ||
| Siemens | N/A | SIMATIC D7-SYS toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC BATCH V10.0 toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC ODK 1500S toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC Process Historian 2020 toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour les vulnérabilités CVE-2025-30033 et CVE-2025-47809 | ||
| Siemens | N/A | SIMATIC S7-1500 Software Controller V2 toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | TIA Portal Cloud Connector toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC WinCC Unified Sequence toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC S7-PLCSIM V17 toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2025-40759. | ||
| Siemens | N/A | SIMATIC WinCC Runtime Advanced toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC Logon V2.0 toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC ProSave V19 versions antérieures à V19 Update 4 | ||
| Siemens | N/A | SIMATIC PDM Maintenance Station V5.0 toutes versions pour les vulnérabilités CVE-2025-30033 et CVE-2025-47809 | ||
| Siemens | N/A | SIMATIC Safety Matrix toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC Management Console toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SCALANCE XCM-/XRM-/XCH-/XRH-300 family versions antérieures à 3.2 | ||
| Siemens | N/A | SIMATIC BATCH V9.1 toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2025-30033. | ||
| Siemens | N/A | SIMATIC Process Function Library (PFL) V4.0 toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2025-30033. | ||
| Siemens | N/A | SIMATIC S7-1500 Software Controller V3 toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC STEP 7 CFC V20 toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2025-30033. | ||
| Siemens | N/A | SIMATIC NET PC Software toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC Route Control V9.1 toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC Process Historian 2022 toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC WinCC OA V3.20 versions antérieures à V3.20 P008 | ||
| Siemens | N/A | SIMATIC RTLS Locating Manager versions antérieures à 3.3 | ||
| Siemens | N/A | Siprotec 4 7SA6, 7SD5 et 7SD610 versions antérieures à 4.78 | ||
| Siemens | N/A | SIMATIC Automation Tool toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | TIA Portal Cloud V18 toutes versions pour les vulnérabilités CVE-2024-54678 et CVE-2025-40759 | ||
| Siemens | N/A | SIMATIC PDM V9.2 et V9.3 toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC WinCC Runtime Professional toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC WinCC Visualization Architect (SiVArc) toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC eaSie Workflow Skills toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC STEP 7 CFC V19 toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2025-30033. | ||
| Siemens | N/A | SIMATIC WinCC V19 versions antérieures à V19 Update 4 | ||
| Siemens | N/A | SIMATIC Management Agent toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC WinCC V7.5 et V8.0 toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC STEP 7 V5.7 toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC Automation Tool SDK Windows toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC Process Historian 2022 toutes versions pour la vulnérabilité CVE-2025-47809 | ||
| Siemens | N/A | SIMATIC S7-PLCSIM V20 versions antérieures à V20 Update 1 | ||
| Siemens | N/A | TIA Portal Cloud V17 toutes versions pour les vulnérabilités CVE-2024-54678 et CVE-2025-40759 | ||
| Siemens | N/A | SIMATIC Energy Suite toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC PCS 7 toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC Process Historian 2024 toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC STEP 7 V19 versions antérieures à V19 Update 4 | ||
| Siemens | N/A | TIA Portal Test Suite V17, v18, v19 et v20 toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC S7-PCT toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC Target toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC ProSave V18 toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2025-30033. | ||
| Siemens | N/A | SIMATIC Logon V1.6 toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2025-30033. | ||
| Siemens | N/A | SIMATIC STEP 7 V17 et V18 toutes versions pour les vulnérabilités CVE-2024-54678 et CVE-2025-40759 | ||
| Siemens | N/A | SIMATIC RTLS Locating Manager versions antérieures à 3.2 | ||
| Siemens | N/A | SIMATIC S7-PLCSIM Advanced versions antérieures à V7.0 Update 1 | ||
| Siemens | N/A | SIMATIC PCS neo V5.0 toutes versions pour la vulnérabilité CVE-2024-54678 | ||
| Siemens | N/A | SIMATIC STEP 7 V20 toutes versions pour les vulnérabilités CVE-2024-54678 et CVE-2025-40759 | ||
| Siemens | N/A | TIA Portal Cloud V20 toutes versions pour les vulnérabilités CVE-2024-54678 et CVE-2025-40759 | ||
| Siemens | N/A | Siprotec 4 toutes versions et tous modèles exceptés 7SA6, 7SD5, 7SD610 pour la vulnérabilité CVE-2024-52504. | ||
| Siemens | N/A | SIMATIC eaSie PCS 7 Skill Package (6DL5424-0BX00-0AV8) toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SCALANCE XC-300/XR-300/XC-400/XR-500WG/XR-500 versions antérieures à 3.2 | ||
| Siemens | N/A | SIMATIC S7-PLCSIM V17, V18 et V19 toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC WinCC Unified PC Runtime V18, V19 et V20 toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC PCS 7 Advanced Process Faceplates V9.1 toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC S7 F Systems V6.4 toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC Information Server toutes versions pour la vulnérabilité CVE-2025-47809 | ||
| Siemens | N/A | SIMATIC S7 F Systems V6.3 toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2025-30033. | ||
| Siemens | N/A | SIMATIC ProSave V20 toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC PCS 7 Logic Matrix V9.1 toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | WinCC Panel Image Setup toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC PCS neo V4.1 et V5.0 toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2024-54678. | ||
| Siemens | N/A | SIMATIC Route Control V10.0 toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC WinCC V8.1 versions antérieures à V8.1 Update 3 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SIMATIC PCS neo V6.0 versions ant\u00e9rieures \u00e0 V6.0 SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC WinCC V17, v18 et V20 toutes versions pour les vuln\u00e9rabilit\u00e9s CVE-2024-54678 et CVE-2025-40759",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC Control Function Library (CFL) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPROTEC 5 versions ant\u00e9rieures \u00e0 10.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC MTP Integrator toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ProSave V17 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC WinCC Unified Line Coordination toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC WinCC TeleControl toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC WinCC OA V3.19 versions ant\u00e9rieures \u00e0 V3.19 P020",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC WinCC flexible ES toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-PLCSIM V17 toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2024-54678.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-Fail-safe Configuration Tool (S7-FCT) versions ant\u00e9rieures \u00e0 4.0.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC PCS neo V6.0 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-54678",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC eaSie Core Package (6DL5424-0AX00-0AV8) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC MTP CREATOR V2.x et V3.x toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC WinCC OA V3.18 versions ant\u00e9rieures \u00e0 V3.18 P032",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "TIA Portal Cloud V19 versions ant\u00e9rieures \u00e0 5.2.1.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC D7-SYS toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC BATCH V10.0 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ODK 1500S toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC Process Historian 2020 toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour les vuln\u00e9rabilit\u00e9s CVE-2025-30033 et CVE-2025-47809",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 Software Controller V2 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "TIA Portal Cloud Connector toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC WinCC Unified Sequence toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-PLCSIM V17 toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-40759.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC WinCC Runtime Advanced toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC Logon V2.0 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ProSave V19 versions ant\u00e9rieures \u00e0 V19 Update 4",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC PDM Maintenance Station V5.0 toutes versions pour les vuln\u00e9rabilit\u00e9s CVE-2025-30033 et CVE-2025-47809",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC Safety Matrix toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC Management Console toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XCM-/XRM-/XCH-/XRH-300 family versions ant\u00e9rieures \u00e0 3.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC BATCH V9.1 toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC Process Function Library (PFL) V4.0 toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 Software Controller V3 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC STEP 7 CFC V20 toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC NET PC Software toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC Route Control V9.1 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC Process Historian 2022 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC WinCC OA V3.20 versions ant\u00e9rieures \u00e0 V3.20 P008",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC RTLS Locating Manager versions ant\u00e9rieures \u00e0 3.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Siprotec 4 7SA6, 7SD5 et 7SD610 versions ant\u00e9rieures \u00e0 4.78",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC Automation Tool toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "TIA Portal Cloud V18 toutes versions pour les vuln\u00e9rabilit\u00e9s CVE-2024-54678 et CVE-2025-40759",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC PDM V9.2 et V9.3 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC WinCC Runtime Professional toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC WinCC Visualization Architect (SiVArc) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC eaSie Workflow Skills toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC STEP 7 CFC V19 toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC WinCC V19 versions ant\u00e9rieures \u00e0 V19 Update 4",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC Management Agent toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC WinCC V7.5 et V8.0 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC STEP 7 V5.7 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC Automation Tool SDK Windows toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC Process Historian 2022 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-47809",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-PLCSIM V20 versions ant\u00e9rieures \u00e0 V20 Update 1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "TIA Portal Cloud V17 toutes versions pour les vuln\u00e9rabilit\u00e9s CVE-2024-54678 et CVE-2025-40759",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC Energy Suite toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC PCS 7 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC Process Historian 2024 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC STEP 7 V19 versions ant\u00e9rieures \u00e0 V19 Update 4",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "TIA Portal Test Suite V17, v18, v19 et v20 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-PCT toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC Target toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ProSave V18 toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC Logon V1.6 toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC STEP 7 V17 et V18 toutes versions pour les vuln\u00e9rabilit\u00e9s CVE-2024-54678 et CVE-2025-40759",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC RTLS Locating Manager versions ant\u00e9rieures \u00e0 3.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-PLCSIM Advanced versions ant\u00e9rieures \u00e0 V7.0 Update 1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC PCS neo V5.0 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-54678",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC STEP 7 V20 toutes versions pour les vuln\u00e9rabilit\u00e9s CVE-2024-54678 et CVE-2025-40759",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "TIA Portal Cloud V20 toutes versions pour les vuln\u00e9rabilit\u00e9s CVE-2024-54678 et CVE-2025-40759",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Siprotec 4 toutes versions et tous mod\u00e8les except\u00e9s 7SA6, 7SD5, 7SD610 pour la vuln\u00e9rabilit\u00e9 CVE-2024-52504. ",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC eaSie PCS 7 Skill Package (6DL5424-0BX00-0AV8) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XC-300/XR-300/XC-400/XR-500WG/XR-500 versions ant\u00e9rieures \u00e0 3.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-PLCSIM V17, V18 et V19 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC WinCC Unified PC Runtime V18, V19 et V20 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC PCS 7 Advanced Process Faceplates V9.1 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7 F Systems V6.4 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC Information Server toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-47809",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7 F Systems V6.3 toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ProSave V20 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC PCS 7 Logic Matrix V9.1 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "WinCC Panel Image Setup toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC PCS neo V4.1 et V5.0 toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2024-54678.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC Route Control V10.0 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC WinCC V8.1 versions ant\u00e9rieures \u00e0 V8.1 Update 3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2023-35827",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35827"
},
{
"name": "CVE-2024-40931",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40931"
},
{
"name": "CVE-2024-56596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56596"
},
{
"name": "CVE-2024-43907",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43907"
},
{
"name": "CVE-2024-56645",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56645"
},
{
"name": "CVE-2024-56659",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56659"
},
{
"name": "CVE-2024-46755",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46755"
},
{
"name": "CVE-2024-47748",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47748"
},
{
"name": "CVE-2024-26825",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26825"
},
{
"name": "CVE-2024-49863",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49863"
},
{
"name": "CVE-2024-41022",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41022"
},
{
"name": "CVE-2024-49907",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49907"
},
{
"name": "CVE-2024-53061",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53061"
},
{
"name": "CVE-2024-53052",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53052"
},
{
"name": "CVE-2023-52477",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52477"
},
{
"name": "CVE-2024-53097",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53097"
},
{
"name": "CVE-2024-46713",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46713"
},
{
"name": "CVE-2023-52622",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52622"
},
{
"name": "CVE-2024-9681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
},
{
"name": "CVE-2024-46844",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46844"
},
{
"name": "CVE-2024-43914",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43914"
},
{
"name": "CVE-2024-26696",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26696"
},
{
"name": "CVE-2024-56670",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56670"
},
{
"name": "CVE-2024-41009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41009"
},
{
"name": "CVE-2024-47697",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47697"
},
{
"name": "CVE-2024-46815",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46815"
},
{
"name": "CVE-2024-39503",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39503"
},
{
"name": "CVE-2025-40759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40759"
},
{
"name": "CVE-2022-48666",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48666"
},
{
"name": "CVE-2024-49890",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49890"
},
{
"name": "CVE-2024-50262",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50262"
},
{
"name": "CVE-2024-40988",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40988"
},
{
"name": "CVE-2024-50268",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50268"
},
{
"name": "CVE-2024-49903",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49903"
},
{
"name": "CVE-2024-49969",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49969"
},
{
"name": "CVE-2023-52804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52804"
},
{
"name": "CVE-2024-41004",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41004"
},
{
"name": "CVE-2024-46676",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46676"
},
{
"name": "CVE-2024-41070",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41070"
},
{
"name": "CVE-2024-46740",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46740"
},
{
"name": "CVE-2023-52845",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52845"
},
{
"name": "CVE-2021-44879",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44879"
},
{
"name": "CVE-2024-46798",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46798"
},
{
"name": "CVE-2024-50195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50195"
},
{
"name": "CVE-2024-53172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53172"
},
{
"name": "CVE-2024-46707",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46707"
},
{
"name": "CVE-2024-49967",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49967"
},
{
"name": "CVE-2024-41000",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41000"
},
{
"name": "CVE-2024-36974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36974"
},
{
"name": "CVE-2023-52818",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52818"
},
{
"name": "CVE-2024-56606",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56606"
},
{
"name": "CVE-2023-52637",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52637"
},
{
"name": "CVE-2024-46747",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46747"
},
{
"name": "CVE-2024-49858",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49858"
},
{
"name": "CVE-2023-52873",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52873"
},
{
"name": "CVE-2024-49948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49948"
},
{
"name": "CVE-2024-56594",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56594"
},
{
"name": "CVE-2024-26754",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26754"
},
{
"name": "CVE-2023-52858",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52858"
},
{
"name": "CVE-2024-46738",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46738"
},
{
"name": "CVE-2023-45863",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45863"
},
{
"name": "CVE-2024-56756",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56756"
},
{
"name": "CVE-2024-52332",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52332"
},
{
"name": "CVE-2024-46679",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46679"
},
{
"name": "CVE-2024-56724",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56724"
},
{
"name": "CVE-2024-53194",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53194"
},
{
"name": "CVE-2024-49878",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49878"
},
{
"name": "CVE-2023-51782",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51782"
},
{
"name": "CVE-2024-46673",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46673"
},
{
"name": "CVE-2024-41034",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41034"
},
{
"name": "CVE-2024-56723",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56723"
},
{
"name": "CVE-2024-53226",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53226"
},
{
"name": "CVE-2024-49884",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49884"
},
{
"name": "CVE-2024-46724",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46724"
},
{
"name": "CVE-2024-56569",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56569"
},
{
"name": "CVE-2024-50074",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50074"
},
{
"name": "CVE-2024-26790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26790"
},
{
"name": "CVE-2024-46791",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46791"
},
{
"name": "CVE-2024-50024",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50024"
},
{
"name": "CVE-2024-47684",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47684"
},
{
"name": "CVE-2024-49965",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49965"
},
{
"name": "CVE-2024-44969",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44969"
},
{
"name": "CVE-2024-56634",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56634"
},
{
"name": "CVE-2024-43098",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43098"
},
{
"name": "CVE-2024-42236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42236"
},
{
"name": "CVE-2024-56548",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56548"
},
{
"name": "CVE-2024-39469",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39469"
},
{
"name": "CVE-2024-39509",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39509"
},
{
"name": "CVE-2024-50202",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50202"
},
{
"name": "CVE-2023-5178",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5178"
},
{
"name": "CVE-2024-26845",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26845"
},
{
"name": "CVE-2024-26704",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26704"
},
{
"name": "CVE-2024-26671",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26671"
},
{
"name": "CVE-2024-46800",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46800"
},
{
"name": "CVE-2023-52810",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52810"
},
{
"name": "CVE-2024-46750",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46750"
},
{
"name": "CVE-2024-39484",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39484"
},
{
"name": "CVE-2024-53181",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53181"
},
{
"name": "CVE-2024-46722",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46722"
},
{
"name": "CVE-2024-26600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26600"
},
{
"name": "CVE-2024-47701",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47701"
},
{
"name": "CVE-2024-40971",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40971"
},
{
"name": "CVE-2023-52847",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52847"
},
{
"name": "CVE-2024-39505",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39505"
},
{
"name": "CVE-2023-52864",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52864"
},
{
"name": "CVE-2024-0646",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0646"
},
{
"name": "CVE-2024-50302",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50302"
},
{
"name": "CVE-2024-47713",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47713"
},
{
"name": "CVE-2024-49936",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49936"
},
{
"name": "CVE-2024-50267",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50267"
},
{
"name": "CVE-2024-56637",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56637"
},
{
"name": "CVE-2024-47663",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47663"
},
{
"name": "CVE-2024-40932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40932"
},
{
"name": "CVE-2024-49881",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49881"
},
{
"name": "CVE-2023-52478",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52478"
},
{
"name": "CVE-2024-41006",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41006"
},
{
"name": "CVE-2023-46343",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46343"
},
{
"name": "CVE-2024-46745",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46745"
},
{
"name": "CVE-2024-46819",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46819"
},
{
"name": "CVE-2024-49896",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49896"
},
{
"name": "CVE-2024-40904",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40904"
},
{
"name": "CVE-2024-42084",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42084"
},
{
"name": "CVE-2024-49959",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49959"
},
{
"name": "CVE-2024-49913",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49913"
},
{
"name": "CVE-2024-56691",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56691"
},
{
"name": "CVE-2024-46721",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46721"
},
{
"name": "CVE-2024-50045",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50045"
},
{
"name": "CVE-2024-26805",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26805"
},
{
"name": "CVE-2024-42153",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42153"
},
{
"name": "CVE-2024-46822",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46822"
},
{
"name": "CVE-2024-40960",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40960"
},
{
"name": "CVE-2024-49995",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49995"
},
{
"name": "CVE-2024-56643",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56643"
},
{
"name": "CVE-2025-40570",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40570"
},
{
"name": "CVE-2024-56661",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56661"
},
{
"name": "CVE-2024-49977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49977"
},
{
"name": "CVE-2024-42154",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42154"
},
{
"name": "CVE-2024-49900",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49900"
},
{
"name": "CVE-2024-46685",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46685"
},
{
"name": "CVE-2024-47679",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47679"
},
{
"name": "CVE-2024-36484",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36484"
},
{
"name": "CVE-2024-43889",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43889"
},
{
"name": "CVE-2024-44998",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44998"
},
{
"name": "CVE-2024-46723",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46723"
},
{
"name": "CVE-2024-42229",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42229"
},
{
"name": "CVE-2024-26839",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26839"
},
{
"name": "CVE-2024-46828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46828"
},
{
"name": "CVE-2024-50269",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50269"
},
{
"name": "CVE-2024-53150",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53150"
},
{
"name": "CVE-2024-47735",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47735"
},
{
"name": "CVE-2024-49952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49952"
},
{
"name": "CVE-2024-49981",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49981"
},
{
"name": "CVE-2024-56595",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56595"
},
{
"name": "CVE-2024-42086",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42086"
},
{
"name": "CVE-2024-26581",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26581"
},
{
"name": "CVE-2022-48935",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48935"
},
{
"name": "CVE-2023-52433",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52433"
},
{
"name": "CVE-2024-41007",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41007"
},
{
"name": "CVE-2024-41095",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41095"
},
{
"name": "CVE-2024-56601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56601"
},
{
"name": "CVE-2023-52600",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52600"
},
{
"name": "CVE-2024-53057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53057"
},
{
"name": "CVE-2024-26910",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26910"
},
{
"name": "CVE-2024-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50181"
},
{
"name": "CVE-2023-52507",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52507"
},
{
"name": "CVE-2024-56571",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56571"
},
{
"name": "CVE-2023-52764",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52764"
},
{
"name": "CVE-2023-52587",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52587"
},
{
"name": "CVE-2023-52887",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52887"
},
{
"name": "CVE-2024-46675",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46675"
},
{
"name": "CVE-2024-26645",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26645"
},
{
"name": "CVE-2024-26702",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26702"
},
{
"name": "CVE-2024-46783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46783"
},
{
"name": "CVE-2023-51779",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51779"
},
{
"name": "CVE-2024-42076",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42076"
},
{
"name": "CVE-2024-26673",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26673"
},
{
"name": "CVE-2024-49997",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49997"
},
{
"name": "CVE-2024-42092",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42092"
},
{
"name": "CVE-2024-26720",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26720"
},
{
"name": "CVE-2024-0584",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0584"
},
{
"name": "CVE-2024-42093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42093"
},
{
"name": "CVE-2024-42247",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42247"
},
{
"name": "CVE-2024-43871",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43871"
},
{
"name": "CVE-2024-53066",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53066"
},
{
"name": "CVE-2023-52784",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52784"
},
{
"name": "CVE-2024-43880",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43880"
},
{
"name": "CVE-2024-27413",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27413"
},
{
"name": "CVE-2024-56629",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56629"
},
{
"name": "CVE-2024-50304",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50304"
},
{
"name": "CVE-2024-40959",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40959"
},
{
"name": "CVE-2024-26615",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26615"
},
{
"name": "CVE-2023-52853",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52853"
},
{
"name": "CVE-2024-46689",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46689"
},
{
"name": "CVE-2024-50295",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50295"
},
{
"name": "CVE-2024-26801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26801"
},
{
"name": "CVE-2024-50051",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50051"
},
{
"name": "CVE-2024-41078",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41078"
},
{
"name": "CVE-2024-53063",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53063"
},
{
"name": "CVE-2024-53171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53171"
},
{
"name": "CVE-2024-56602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56602"
},
{
"name": "CVE-2024-46781",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46781"
},
{
"name": "CVE-2024-56770",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56770"
},
{
"name": "CVE-2024-53157",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53157"
},
{
"name": "CVE-2025-30034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30034"
},
{
"name": "CVE-2024-46777",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46777"
},
{
"name": "CVE-2023-52340",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52340"
},
{
"name": "CVE-2024-50199",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50199"
},
{
"name": "CVE-2024-26779",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26779"
},
{
"name": "CVE-2024-40916",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40916"
},
{
"name": "CVE-2024-0193",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0193"
},
{
"name": "CVE-2023-52604",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52604"
},
{
"name": "CVE-2024-50040",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50040"
},
{
"name": "CVE-2024-38586",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38586"
},
{
"name": "CVE-2024-56739",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56739"
},
{
"name": "CVE-2024-50292",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50292"
},
{
"name": "CVE-2024-53103",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53103"
},
{
"name": "CVE-2024-46714",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46714"
},
{
"name": "CVE-2024-40976",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40976"
},
{
"name": "CVE-2024-41081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41081"
},
{
"name": "CVE-2025-40746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40746"
},
{
"name": "CVE-2024-49983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49983"
},
{
"name": "CVE-2023-52601",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52601"
},
{
"name": "CVE-2024-41072",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41072"
},
{
"name": "CVE-2024-44960",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44960"
},
{
"name": "CVE-2024-26773",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26773"
},
{
"name": "CVE-2024-26722",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26722"
},
{
"name": "CVE-2024-54678",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54678"
},
{
"name": "CVE-2024-26598",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26598"
},
{
"name": "CVE-2024-53197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53197"
},
{
"name": "CVE-2024-26679",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26679"
},
{
"name": "CVE-2024-39468",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39468"
},
{
"name": "CVE-2024-26763",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26763"
},
{
"name": "CVE-2024-49889",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49889"
},
{
"name": "CVE-2023-52435",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52435"
},
{
"name": "CVE-2024-40980",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40980"
},
{
"name": "CVE-2023-52654",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52654"
},
{
"name": "CVE-2024-36938",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36938"
},
{
"name": "CVE-2024-40974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40974"
},
{
"name": "CVE-2023-52855",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52855"
},
{
"name": "CVE-2024-56779",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56779"
},
{
"name": "CVE-2024-26749",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26749"
},
{
"name": "CVE-2024-44971",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44971"
},
{
"name": "CVE-2023-52603",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52603"
},
{
"name": "CVE-2024-43894",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43894"
},
{
"name": "CVE-2023-52486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52486"
},
{
"name": "CVE-2024-43867",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43867"
},
{
"name": "CVE-2023-52868",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52868"
},
{
"name": "CVE-2023-52619",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52619"
},
{
"name": "CVE-2023-52796",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52796"
},
{
"name": "CVE-2023-52475",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52475"
},
{
"name": "CVE-2024-50013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50013"
},
{
"name": "CVE-2024-50185",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50185"
},
{
"name": "CVE-2024-53239",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53239"
},
{
"name": "CVE-2023-52617",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52617"
},
{
"name": "CVE-2024-49957",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49957"
},
{
"name": "CVE-2024-49962",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49962"
},
{
"name": "CVE-2024-46731",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46731"
},
{
"name": "CVE-2024-39502",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39502"
},
{
"name": "CVE-2024-46674",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46674"
},
{
"name": "CVE-2023-52836",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52836"
},
{
"name": "CVE-2024-26804",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26804"
},
{
"name": "CVE-2024-26593",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26593"
},
{
"name": "CVE-2024-26751",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26751"
},
{
"name": "CVE-2024-49958",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49958"
},
{
"name": "CVE-2024-50082",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50082"
},
{
"name": "CVE-2024-47723",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47723"
},
{
"name": "CVE-2024-49955",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49955"
},
{
"name": "CVE-2024-42087",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42087"
},
{
"name": "CVE-2024-44944",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44944"
},
{
"name": "CVE-2024-43893",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43893"
},
{
"name": "CVE-2024-50095",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50095"
},
{
"name": "CVE-2024-40983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40983"
},
{
"name": "CVE-2024-50296",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50296"
},
{
"name": "CVE-2024-57874",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57874"
},
{
"name": "CVE-2024-53145",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53145"
},
{
"name": "CVE-2024-50006",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50006"
},
{
"name": "CVE-2022-49034",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49034"
},
{
"name": "CVE-2024-50049",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50049"
},
{
"name": "CVE-2024-27412",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27412"
},
{
"name": "CVE-2024-26636",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26636"
},
{
"name": "CVE-2024-56642",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56642"
},
{
"name": "CVE-2024-50007",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50007"
},
{
"name": "CVE-2024-56586",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56586"
},
{
"name": "CVE-2023-39198",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39198"
},
{
"name": "CVE-2024-40963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40963"
},
{
"name": "CVE-2025-40752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40752"
},
{
"name": "CVE-2024-41041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41041"
},
{
"name": "CVE-2024-50096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50096"
},
{
"name": "CVE-2023-52789",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52789"
},
{
"name": "CVE-2024-49868",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49868"
},
{
"name": "CVE-2024-40947",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40947"
},
{
"name": "CVE-2024-53173",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53173"
},
{
"name": "CVE-2024-50237",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50237"
},
{
"name": "CVE-2023-52867",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52867"
},
{
"name": "CVE-2024-44995",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44995"
},
{
"name": "CVE-2024-46757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46757"
},
{
"name": "CVE-2024-42232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42232"
},
{
"name": "CVE-2024-47699",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47699"
},
{
"name": "CVE-2024-56581",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56581"
},
{
"name": "CVE-2024-46677",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46677"
},
{
"name": "CVE-2024-50059",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50059"
},
{
"name": "CVE-2024-50264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50264"
},
{
"name": "CVE-2024-26606",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26606"
},
{
"name": "CVE-2024-35833",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35833"
},
{
"name": "CVE-2024-41005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41005"
},
{
"name": "CVE-2024-43883",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43883"
},
{
"name": "CVE-2024-56623",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56623"
},
{
"name": "CVE-2024-26625",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26625"
},
{
"name": "CVE-2024-44935",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44935"
},
{
"name": "CVE-2024-44999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44999"
},
{
"name": "CVE-2024-47712",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47712"
},
{
"name": "CVE-2024-56610",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56610"
},
{
"name": "CVE-2024-26748",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26748"
},
{
"name": "CVE-2023-52809",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52809"
},
{
"name": "CVE-2024-42223",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42223"
},
{
"name": "CVE-2024-49963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49963"
},
{
"name": "CVE-2024-49971",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49971"
},
{
"name": "CVE-2024-56562",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56562"
},
{
"name": "CVE-2024-26635",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26635"
},
{
"name": "CVE-2023-52805",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52805"
},
{
"name": "CVE-2024-41097",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41097"
},
{
"name": "CVE-2024-49875",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49875"
},
{
"name": "CVE-2024-47739",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47739"
},
{
"name": "CVE-2024-47705",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47705"
},
{
"name": "CVE-2024-53161",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53161"
},
{
"name": "CVE-2023-52919",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52919"
},
{
"name": "CVE-2024-50035",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50035"
},
{
"name": "CVE-2024-56600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56600"
},
{
"name": "CVE-2024-36978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36978"
},
{
"name": "CVE-2024-44988",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44988"
},
{
"name": "CVE-2024-47660",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47660"
},
{
"name": "CVE-2024-56690",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56690"
},
{
"name": "CVE-2024-56597",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56597"
},
{
"name": "CVE-2024-40905",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40905"
},
{
"name": "CVE-2024-56574",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56574"
},
{
"name": "CVE-2024-47740",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47740"
},
{
"name": "CVE-2024-41063",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41063"
},
{
"name": "CVE-2024-41017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41017"
},
{
"name": "CVE-2024-26697",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26697"
},
{
"name": "CVE-2024-42244",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42244"
},
{
"name": "CVE-2024-49924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49924"
},
{
"name": "CVE-2024-46758",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46758"
},
{
"name": "CVE-2024-53217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53217"
},
{
"name": "CVE-2024-53183",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53183"
},
{
"name": "CVE-2024-49938",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49938"
},
{
"name": "CVE-2024-41012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41012"
},
{
"name": "CVE-2024-40902",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40902"
},
{
"name": "CVE-2024-47756",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47756"
},
{
"name": "CVE-2024-40934",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40934"
},
{
"name": "CVE-2024-47667",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47667"
},
{
"name": "CVE-2024-46756",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46756"
},
{
"name": "CVE-2024-56615",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56615"
},
{
"name": "CVE-2024-47737",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47737"
},
{
"name": "CVE-2024-46739",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46739"
},
{
"name": "CVE-2024-47669",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47669"
},
{
"name": "CVE-2024-56705",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56705"
},
{
"name": "CVE-2024-50290",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50290"
},
{
"name": "CVE-2024-50008",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50008"
},
{
"name": "CVE-2024-42082",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42082"
},
{
"name": "CVE-2024-26685",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26685"
},
{
"name": "CVE-2024-56704",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56704"
},
{
"name": "CVE-2024-45006",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45006"
},
{
"name": "CVE-2024-46725",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46725"
},
{
"name": "CVE-2024-46829",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46829"
},
{
"name": "CVE-2024-40912",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40912"
},
{
"name": "CVE-2023-52599",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52599"
},
{
"name": "CVE-2024-56589",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56589"
},
{
"name": "CVE-2024-50265",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50265"
},
{
"name": "CVE-2024-56636",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56636"
},
{
"name": "CVE-2024-41089",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41089"
},
{
"name": "CVE-2024-39487",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39487"
},
{
"name": "CVE-2024-56567",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56567"
},
{
"name": "CVE-2024-44954",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44954"
},
{
"name": "CVE-2024-43908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43908"
},
{
"name": "CVE-2023-3567",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3567"
},
{
"name": "CVE-2024-50033",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50033"
},
{
"name": "CVE-2024-43890",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43890"
},
{
"name": "CVE-2024-26688",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26688"
},
{
"name": "CVE-2023-52865",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52865"
},
{
"name": "CVE-2024-49901",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49901"
},
{
"name": "CVE-2024-36901",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36901"
},
{
"name": "CVE-2024-56688",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56688"
},
{
"name": "CVE-2024-41090",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41090"
},
{
"name": "CVE-2024-50180",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50180"
},
{
"name": "CVE-2024-26663",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26663"
},
{
"name": "CVE-2024-50282",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50282"
},
{
"name": "CVE-2024-50273",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50273"
},
{
"name": "CVE-2024-26675",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26675"
},
{
"name": "CVE-2024-56532",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56532"
},
{
"name": "CVE-2024-41077",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41077"
},
{
"name": "CVE-2024-47143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47143"
},
{
"name": "CVE-2024-49949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49949"
},
{
"name": "CVE-2023-52509",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52509"
},
{
"name": "CVE-2024-44952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44952"
},
{
"name": "CVE-2023-52753",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52753"
},
{
"name": "CVE-2024-26840",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26840"
},
{
"name": "CVE-2024-50046",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50046"
},
{
"name": "CVE-2023-52583",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52583"
},
{
"name": "CVE-2024-50099",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50099"
},
{
"name": "CVE-2024-50193",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50193"
},
{
"name": "CVE-2024-46743",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46743"
},
{
"name": "CVE-2024-49944",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49944"
},
{
"name": "CVE-2023-52602",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52602"
},
{
"name": "CVE-2024-50198",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50198"
},
{
"name": "CVE-2023-52832",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52832"
},
{
"name": "CVE-2024-56746",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56746"
},
{
"name": "CVE-2024-47749",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47749"
},
{
"name": "CVE-2024-41092",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41092"
},
{
"name": "CVE-2024-49966",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49966"
},
{
"name": "CVE-2024-40995",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40995"
},
{
"name": "CVE-2024-41087",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41087"
},
{
"name": "CVE-2023-52819",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52819"
},
{
"name": "CVE-2023-52876",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52876"
},
{
"name": "CVE-2024-42095",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42095"
},
{
"name": "CVE-2024-49902",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49902"
},
{
"name": "CVE-2024-47757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47757"
},
{
"name": "CVE-2025-30033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30033"
},
{
"name": "CVE-2024-27417",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27417"
},
{
"name": "CVE-2024-48881",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-48881"
},
{
"name": "CVE-2024-47692",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47692"
},
{
"name": "CVE-2024-46744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46744"
},
{
"name": "CVE-2024-0841",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0841"
},
{
"name": "CVE-2025-40753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40753"
},
{
"name": "CVE-2024-50184",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50184"
},
{
"name": "CVE-2024-40929",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40929"
},
{
"name": "CVE-2024-39501",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39501"
},
{
"name": "CVE-2024-52504",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52504"
},
{
"name": "CVE-2024-50287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50287"
},
{
"name": "CVE-2024-56747",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56747"
},
{
"name": "CVE-2024-49851",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49851"
},
{
"name": "CVE-2023-6040",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6040"
},
{
"name": "CVE-2023-52510",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52510"
},
{
"name": "CVE-2023-51781",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51781"
},
{
"name": "CVE-2024-56603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56603"
},
{
"name": "CVE-2024-53158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53158"
},
{
"name": "CVE-2024-43882",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43882"
},
{
"name": "CVE-2024-41068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41068"
},
{
"name": "CVE-2024-56644",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56644"
},
{
"name": "CVE-2024-46780",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46780"
},
{
"name": "CVE-2024-46817",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46817"
},
{
"name": "CVE-2024-42101",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42101"
},
{
"name": "CVE-2025-40751",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40751"
},
{
"name": "CVE-2024-50278",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50278"
},
{
"name": "CVE-2024-50201",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50201"
},
{
"name": "CVE-2024-35835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35835"
},
{
"name": "CVE-2024-56701",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56701"
},
{
"name": "CVE-2024-42077",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42077"
},
{
"name": "CVE-2023-52670",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52670"
},
{
"name": "CVE-2024-40943",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40943"
},
{
"name": "CVE-2024-26735",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26735"
},
{
"name": "CVE-2024-49933",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49933"
},
{
"name": "CVE-2024-53184",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53184"
},
{
"name": "CVE-2024-47685",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47685"
},
{
"name": "CVE-2024-40901",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40901"
},
{
"name": "CVE-2022-48829",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48829"
},
{
"name": "CVE-2024-53174",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53174"
},
{
"name": "CVE-2024-49879",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49879"
},
{
"name": "CVE-2024-39495",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39495"
},
{
"name": "CVE-2024-50044",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50044"
},
{
"name": "CVE-2024-49894",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49894"
},
{
"name": "CVE-2024-56700",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56700"
},
{
"name": "CVE-2024-47718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47718"
},
{
"name": "CVE-2024-49867",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49867"
},
{
"name": "CVE-2023-51780",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51780"
},
{
"name": "CVE-2024-49985",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49985"
},
{
"name": "CVE-2024-50001",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50001"
},
{
"name": "CVE-2023-52881",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52881"
},
{
"name": "CVE-2024-49993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49993"
},
{
"name": "CVE-2024-56728",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56728"
},
{
"name": "CVE-2024-43861",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43861"
},
{
"name": "CVE-2024-53241",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53241"
},
{
"name": "CVE-2023-52838",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52838"
},
{
"name": "CVE-2024-47710",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47710"
},
{
"name": "CVE-2024-46771",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46771"
},
{
"name": "CVE-2024-50083",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50083"
},
{
"name": "CVE-2023-52774",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52774"
},
{
"name": "CVE-2024-56531",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56531"
},
{
"name": "CVE-2024-49892",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49892"
},
{
"name": "CVE-2024-49930",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49930"
},
{
"name": "CVE-2024-53148",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53148"
},
{
"name": "CVE-2024-47698",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47698"
},
{
"name": "CVE-2023-52879",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52879"
},
{
"name": "CVE-2024-56681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56681"
},
{
"name": "CVE-2024-26602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26602"
},
{
"name": "CVE-2023-52799",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52799"
},
{
"name": "CVE-2024-38619",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38619"
},
{
"name": "CVE-2024-50039",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50039"
},
{
"name": "CVE-2024-50251",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50251"
},
{
"name": "CVE-2024-56754",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56754"
},
{
"name": "CVE-2024-49973",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49973"
},
{
"name": "CVE-2024-53214",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53214"
},
{
"name": "CVE-2024-39476",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39476"
},
{
"name": "CVE-2024-46804",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46804"
},
{
"name": "CVE-2024-56619",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56619"
},
{
"name": "CVE-2024-47668",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47668"
},
{
"name": "CVE-2024-49883",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49883"
},
{
"name": "CVE-2024-53165",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53165"
},
{
"name": "CVE-2024-50236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50236"
},
{
"name": "CVE-2024-46840",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46840"
},
{
"name": "CVE-2022-48828",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48828"
},
{
"name": "CVE-2024-56568",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56568"
},
{
"name": "CVE-2024-46763",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46763"
},
{
"name": "CVE-2024-41059",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41059"
},
{
"name": "CVE-2024-42094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42094"
},
{
"name": "CVE-2024-53146",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53146"
},
{
"name": "CVE-2024-46759",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46759"
},
{
"name": "CVE-2024-27416",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27416"
},
{
"name": "CVE-2023-52598",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52598"
},
{
"name": "CVE-2024-46737",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46737"
},
{
"name": "CVE-2024-41040",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41040"
},
{
"name": "CVE-2023-6606",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6606"
},
{
"name": "CVE-2024-40987",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40987"
},
{
"name": "CVE-2024-56539",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56539"
},
{
"name": "CVE-2023-52806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52806"
},
{
"name": "CVE-2024-56662",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56662"
},
{
"name": "CVE-2024-46814",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46814"
},
{
"name": "CVE-2024-56572",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56572"
},
{
"name": "CVE-2024-56570",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56570"
},
{
"name": "CVE-2024-26793",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26793"
},
{
"name": "CVE-2024-40945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40945"
},
{
"name": "CVE-2024-46818",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46818"
},
{
"name": "CVE-2023-6932",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6932"
},
{
"name": "CVE-2024-50602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50602"
},
{
"name": "CVE-2024-40941",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40941"
},
{
"name": "CVE-2022-48827",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48827"
},
{
"name": "CVE-2023-52594",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52594"
},
{
"name": "CVE-2024-53198",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53198"
},
{
"name": "CVE-2024-44965",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44965"
},
{
"name": "CVE-2024-49860",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49860"
},
{
"name": "CVE-2024-45003",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45003"
},
{
"name": "CVE-2024-41055",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41055"
},
{
"name": "CVE-2023-52595",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52595"
},
{
"name": "CVE-2025-47809",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47809"
},
{
"name": "CVE-2024-50234",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50234"
},
{
"name": "CVE-2024-56720",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56720"
},
{
"name": "CVE-2024-26752",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26752"
},
{
"name": "CVE-2024-41015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41015"
},
{
"name": "CVE-2024-53155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53155"
},
{
"name": "CVE-2024-40984",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40984"
},
{
"name": "CVE-2024-42224",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42224"
},
{
"name": "CVE-2024-50194",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50194"
},
{
"name": "CVE-2024-46832",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46832"
},
{
"name": "CVE-2023-52871",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52871"
},
{
"name": "CVE-2024-49895",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49895"
},
{
"name": "CVE-2024-56785",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56785"
},
{
"name": "CVE-2023-52623",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52623"
},
{
"name": "CVE-2024-26736",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26736"
},
{
"name": "CVE-2024-56587",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56587"
},
{
"name": "CVE-2024-45021",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45021"
},
{
"name": "CVE-2023-52655",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52655"
},
{
"name": "CVE-2024-49882",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49882"
},
{
"name": "CVE-2024-47659",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47659"
},
{
"name": "CVE-2024-42161",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42161"
},
{
"name": "CVE-2023-52813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52813"
},
{
"name": "CVE-2024-56741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56741"
},
{
"name": "CVE-2023-52504",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52504"
},
{
"name": "CVE-2024-39506",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39506"
},
{
"name": "CVE-2024-40990",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40990"
},
{
"name": "CVE-2024-40978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40978"
},
{
"name": "CVE-2024-53104",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53104"
},
{
"name": "CVE-2023-52615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52615"
},
{
"name": "CVE-2024-40968",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40968"
},
{
"name": "CVE-2024-45025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45025"
},
{
"name": "CVE-2024-27414",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27414"
},
{
"name": "CVE-2024-56748",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56748"
},
{
"name": "CVE-2024-41035",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41035"
},
{
"name": "CVE-2024-56648",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56648"
},
{
"name": "CVE-2024-26777",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26777"
},
{
"name": "CVE-2024-41049",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41049"
},
{
"name": "CVE-2024-26764",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26764"
},
{
"name": "CVE-2024-42143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42143"
},
{
"name": "CVE-2021-47316",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47316"
},
{
"name": "CVE-2024-56558",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56558"
},
{
"name": "CVE-2024-41065",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41065"
},
{
"name": "CVE-2024-43879",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43879"
},
{
"name": "CVE-2024-46761",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46761"
},
{
"name": "CVE-2023-52606",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52606"
},
{
"name": "CVE-2024-50301",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50301"
},
{
"name": "CVE-2024-26778",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26778"
},
{
"name": "CVE-2024-37078",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37078"
},
{
"name": "CVE-2024-49975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49975"
},
{
"name": "CVE-2024-53240",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53240"
},
{
"name": "CVE-2024-50179",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50179"
},
{
"name": "CVE-2024-53101",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53101"
},
{
"name": "CVE-2024-47696",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47696"
},
{
"name": "CVE-2023-52840",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52840"
},
{
"name": "CVE-2024-53156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53156"
},
{
"name": "CVE-2023-52502",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52502"
},
{
"name": "CVE-2024-41091",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41091"
},
{
"name": "CVE-2024-42105",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42105"
},
{
"name": "CVE-2024-50015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50015"
},
{
"name": "CVE-2023-52597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52597"
},
{
"name": "CVE-2024-41044",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41044"
},
{
"name": "CVE-2024-40958",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40958"
},
{
"name": "CVE-2023-52581",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52581"
},
{
"name": "CVE-2024-45008",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45008"
},
{
"name": "CVE-2024-50188",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50188"
},
{
"name": "CVE-2024-56533",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56533"
},
{
"name": "CVE-2024-40981",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40981"
},
{
"name": "CVE-2023-52917",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52917"
},
{
"name": "CVE-2024-56598",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56598"
},
{
"name": "CVE-2024-1086",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1086"
},
{
"name": "CVE-2024-53060",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53060"
},
{
"name": "CVE-2023-52875",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52875"
},
{
"name": "CVE-2024-44990",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44990"
},
{
"name": "CVE-2024-44987",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44987"
},
{
"name": "CVE-2024-56781",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56781"
},
{
"name": "CVE-2024-41046",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41046"
},
{
"name": "CVE-2024-50089",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50089"
},
{
"name": "CVE-2024-56630",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56630"
},
{
"name": "CVE-2024-42152",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42152"
},
{
"name": "CVE-2024-49982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49982"
},
{
"name": "CVE-2023-52835",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52835"
},
{
"name": "CVE-2024-53059",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53059"
},
{
"name": "CVE-2024-50299",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50299"
},
{
"name": "CVE-2024-50218",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50218"
},
{
"name": "CVE-2024-42148",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42148"
},
{
"name": "CVE-2024-39482",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39482"
},
{
"name": "CVE-2024-39499",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39499"
},
{
"name": "CVE-2024-56633",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56633"
},
{
"name": "CVE-2024-56593",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56593"
},
{
"name": "CVE-2024-56605",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56605"
},
{
"name": "CVE-2024-53680",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53680"
},
{
"name": "CVE-2024-26835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26835"
},
{
"name": "CVE-2024-26791",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26791"
},
{
"name": "CVE-2023-52843",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52843"
},
{
"name": "CVE-2024-50279",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50279"
},
{
"name": "CVE-2024-41064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41064"
},
{
"name": "CVE-2024-36894",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36894"
},
{
"name": "CVE-2024-56698",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56698"
},
{
"name": "CVE-2024-47742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47742"
},
{
"name": "CVE-2024-47709",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47709"
},
{
"name": "CVE-2024-41020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41020"
},
{
"name": "CVE-2024-26772",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26772"
},
{
"name": "CVE-2024-46782",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46782"
},
{
"name": "CVE-2024-56780",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56780"
},
{
"name": "CVE-2024-47706",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47706"
},
{
"name": "CVE-2024-27405",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27405"
},
{
"name": "CVE-2024-46702",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46702"
},
{
"name": "CVE-2023-5717",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5717"
},
{
"name": "CVE-2024-47747",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47747"
},
{
"name": "CVE-2024-40942",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40942"
},
{
"name": "CVE-2024-26766",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26766"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2024-26664",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26664"
},
{
"name": "CVE-2024-46719",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46719"
},
{
"name": "CVE-2024-49877",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49877"
},
{
"name": "CVE-2023-52791",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52791"
},
{
"name": "CVE-2024-44949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44949"
},
{
"name": "CVE-2023-6121",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6121"
},
{
"name": "CVE-2023-52607",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52607"
},
{
"name": "CVE-2024-56650",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56650"
},
{
"name": "CVE-2024-44989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44989"
},
{
"name": "CVE-2024-26788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26788"
},
{
"name": "CVE-2023-52817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52817"
},
{
"name": "CVE-2024-27410",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27410"
},
{
"name": "CVE-2024-26684",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26684"
},
{
"name": "CVE-2024-53237",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53237"
},
{
"name": "CVE-2023-6931",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6931"
},
{
"name": "CVE-2024-56576",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56576"
},
{
"name": "CVE-2024-42145",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42145"
},
{
"name": "CVE-2024-40961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40961"
},
{
"name": "CVE-2024-53227",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53227"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0677",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-08-12T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Siemens. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Siemens",
"vendor_advisories": [
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-707630",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-707630.html"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-331739",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-331739.html"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-693808",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-693808.html"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-613116",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-613116.html"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-493396",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-493396.html"
},
{
"published_at": "2025-08-11",
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-400089",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-400089.html"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-493787",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-493787.html"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-894058",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-894058.html"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-355557",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-355557.html"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-529291",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-529291.html"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-282044",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-282044.html"
}
]
}
CERTFR-2024-AVI-0527
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Debian LTS. Elles permettent à un attaquant de provoquer une élévation de privilèges, une atteinte à la confidentialité des données et un déni de service.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Debian | N/A | Debian LTS buster versions antérieures à 5.10.209-2~deb10u1 | ||
| Debian | N/A | Debian LTS buster versions antérieures à 5.10.218-1~deb10u1 | ||
| Debian | N/A | Debian LTS buster versions antérieures à 5.10.216-1~deb10u1 | ||
| Debian | N/A | Debian LTS buster versions antérieures à 4.19.316-1 |
| Title | Publication Time | Tags | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Debian LTS buster versions ant\u00e9rieures \u00e0 5.10.209-2~deb10u1",
"product": {
"name": "N/A",
"vendor": {
"name": "Debian",
"scada": false
}
}
},
{
"description": "Debian LTS buster versions ant\u00e9rieures \u00e0 5.10.218-1~deb10u1",
"product": {
"name": "N/A",
"vendor": {
"name": "Debian",
"scada": false
}
}
},
{
"description": "Debian LTS buster versions ant\u00e9rieures \u00e0 5.10.216-1~deb10u1",
"product": {
"name": "N/A",
"vendor": {
"name": "Debian",
"scada": false
}
}
},
{
"description": "Debian LTS buster versions ant\u00e9rieures \u00e0 4.19.316-1",
"product": {
"name": "N/A",
"vendor": {
"name": "Debian",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2022-38096",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38096"
},
{
"name": "CVE-2023-0386",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0386"
},
{
"name": "CVE-2023-39198",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39198"
},
{
"name": "CVE-2023-6606",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6606"
},
{
"name": "CVE-2023-51779",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51779"
},
{
"name": "CVE-2023-46838",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46838"
},
{
"name": "CVE-2023-6040",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6040"
},
{
"name": "CVE-2023-6536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6536"
},
{
"name": "CVE-2023-6356",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6356"
},
{
"name": "CVE-2023-6535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6535"
},
{
"name": "CVE-2024-0646",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0646"
},
{
"name": "CVE-2024-0607",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0607"
},
{
"name": "CVE-2024-0565",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0565"
},
{
"name": "CVE-2023-6915",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6915"
},
{
"name": "CVE-2024-0340",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0340"
},
{
"name": "CVE-2023-47233",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47233"
},
{
"name": "CVE-2024-24860",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24860"
},
{
"name": "CVE-2024-1086",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1086"
},
{
"name": "CVE-2023-28746",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28746"
},
{
"name": "CVE-2023-52454",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52454"
},
{
"name": "CVE-2024-26600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26600"
},
{
"name": "CVE-2023-52467",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52467"
},
{
"name": "CVE-2023-52451",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52451"
},
{
"name": "CVE-2023-52436",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52436"
},
{
"name": "CVE-2023-52445",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52445"
},
{
"name": "CVE-2023-52597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52597"
},
{
"name": "CVE-2024-26598",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26598"
},
{
"name": "CVE-2023-52462",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52462"
},
{
"name": "CVE-2023-52443",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52443"
},
{
"name": "CVE-2023-52469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52469"
},
{
"name": "CVE-2023-52598",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52598"
},
{
"name": "CVE-2023-52470",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52470"
},
{
"name": "CVE-2023-52601",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52601"
},
{
"name": "CVE-2023-52439",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52439"
},
{
"name": "CVE-2023-52438",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52438"
},
{
"name": "CVE-2023-52464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52464"
},
{
"name": "CVE-2023-52600",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52600"
},
{
"name": "CVE-2023-52458",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52458"
},
{
"name": "CVE-2023-52602",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52602"
},
{
"name": "CVE-2024-26625",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26625"
},
{
"name": "CVE-2024-26627",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26627"
},
{
"name": "CVE-2023-52463",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52463"
},
{
"name": "CVE-2023-52447",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52447"
},
{
"name": "CVE-2023-52449",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52449"
},
{
"name": "CVE-2024-26581",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26581"
},
{
"name": "CVE-2023-52457",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52457"
},
{
"name": "CVE-2023-52606",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52606"
},
{
"name": "CVE-2023-52604",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52604"
},
{
"name": "CVE-2023-52587",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52587"
},
{
"name": "CVE-2023-52448",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52448"
},
{
"name": "CVE-2023-52599",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52599"
},
{
"name": "CVE-2023-52444",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52444"
},
{
"name": "CVE-2023-52583",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52583"
},
{
"name": "CVE-2023-52603",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52603"
},
{
"name": "CVE-2023-52456",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52456"
},
{
"name": "CVE-2023-52607",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52607"
},
{
"name": "CVE-2023-52594",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52594"
},
{
"name": "CVE-2024-26601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26601"
},
{
"name": "CVE-2023-52595",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52595"
},
{
"name": "CVE-2024-23849",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23849"
},
{
"name": "CVE-2024-26597",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26597"
},
{
"name": "CVE-2024-26602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26602"
},
{
"name": "CVE-2023-52340",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52340"
},
{
"name": "CVE-2024-23850",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23850"
},
{
"name": "CVE-2024-26622",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26622"
},
{
"name": "CVE-2024-23851",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23851"
},
{
"name": "CVE-2024-1151",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1151"
},
{
"name": "CVE-2023-6270",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6270"
},
{
"name": "CVE-2024-26593",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26593"
},
{
"name": "CVE-2023-52429",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52429"
},
{
"name": "CVE-2023-52482",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52482"
},
{
"name": "CVE-2024-26586",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26586"
},
{
"name": "CVE-2022-48627",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48627"
},
{
"name": "CVE-2024-26633",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26633"
},
{
"name": "CVE-2023-52434",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52434"
},
{
"name": "CVE-2023-52609",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52609"
},
{
"name": "CVE-2023-52435",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52435"
},
{
"name": "CVE-2023-52612",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52612"
},
{
"name": "CVE-2024-26642",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26642"
},
{
"name": "CVE-2023-52617",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52617"
},
{
"name": "CVE-2024-26645",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26645"
},
{
"name": "CVE-2024-0841",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0841"
},
{
"name": "CVE-2024-26695",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26695"
},
{
"name": "CVE-2024-26654",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26654"
},
{
"name": "CVE-2023-52615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52615"
},
{
"name": "CVE-2024-26659",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26659"
},
{
"name": "CVE-2023-52486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52486"
},
{
"name": "CVE-2023-52628",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52628"
},
{
"name": "CVE-2023-52493",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52493"
},
{
"name": "CVE-2024-26614",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26614"
},
{
"name": "CVE-2023-52637",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52637"
},
{
"name": "CVE-2023-52497",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52497"
},
{
"name": "CVE-2023-52492",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52492"
},
{
"name": "CVE-2024-25739",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25739"
},
{
"name": "CVE-2024-22099",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22099"
},
{
"name": "CVE-2024-26664",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26664"
},
{
"name": "CVE-2023-52623",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52623"
},
{
"name": "CVE-2023-52619",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52619"
},
{
"name": "CVE-2024-26651",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26651"
},
{
"name": "CVE-2023-7042",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7042"
},
{
"name": "CVE-2024-26707",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26707"
},
{
"name": "CVE-2024-26754",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26754"
},
{
"name": "CVE-2024-26795",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26795"
},
{
"name": "CVE-2024-26697",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26697"
},
{
"name": "CVE-2024-26704",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26704"
},
{
"name": "CVE-2024-26720",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26720"
},
{
"name": "CVE-2023-52622",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52622"
},
{
"name": "CVE-2024-26689",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26689"
},
{
"name": "CVE-2024-26727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26727"
},
{
"name": "CVE-2024-26671",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26671"
},
{
"name": "CVE-2024-26748",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26748"
},
{
"name": "CVE-2024-26776",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26776"
},
{
"name": "CVE-2024-26606",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26606"
},
{
"name": "CVE-2024-26702",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26702"
},
{
"name": "CVE-2024-26766",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26766"
},
{
"name": "CVE-2024-26814",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26814"
},
{
"name": "CVE-2024-26685",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26685"
},
{
"name": "CVE-2024-26771",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26771"
},
{
"name": "CVE-2024-26810",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26810"
},
{
"name": "CVE-2024-26801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26801"
},
{
"name": "CVE-2024-26787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26787"
},
{
"name": "CVE-2024-26781",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26781"
},
{
"name": "CVE-2024-26663",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26663"
},
{
"name": "CVE-2024-26675",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26675"
},
{
"name": "CVE-2024-26752",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26752"
},
{
"name": "CVE-2024-26743",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26743"
},
{
"name": "CVE-2024-26805",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26805"
},
{
"name": "CVE-2024-26773",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26773"
},
{
"name": "CVE-2023-52618",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52618"
},
{
"name": "CVE-2024-26712",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26712"
},
{
"name": "CVE-2024-26793",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26793"
},
{
"name": "CVE-2024-24858",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24858"
},
{
"name": "CVE-2023-52616",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52616"
},
{
"name": "CVE-2024-26813",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26813"
},
{
"name": "CVE-2024-26764",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26764"
},
{
"name": "CVE-2024-27437",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27437"
},
{
"name": "CVE-2024-26735",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26735"
},
{
"name": "CVE-2024-26684",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26684"
},
{
"name": "CVE-2024-24857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24857"
},
{
"name": "CVE-2024-26679",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26679"
},
{
"name": "CVE-2024-26816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26816"
},
{
"name": "CVE-2024-26749",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26749"
},
{
"name": "CVE-2024-26688",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26688"
},
{
"name": "CVE-2024-26744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26744"
},
{
"name": "CVE-2024-26640",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26640"
},
{
"name": "CVE-2024-26763",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26763"
},
{
"name": "CVE-2024-26722",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26722"
},
{
"name": "CVE-2024-26777",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26777"
},
{
"name": "CVE-2024-26733",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26733"
},
{
"name": "CVE-2024-26779",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26779"
},
{
"name": "CVE-2023-52620",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52620"
},
{
"name": "CVE-2024-26772",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26772"
},
{
"name": "CVE-2024-26791",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26791"
},
{
"name": "CVE-2023-52635",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52635"
},
{
"name": "CVE-2024-26788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26788"
},
{
"name": "CVE-2024-26812",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26812"
},
{
"name": "CVE-2024-26643",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26643"
},
{
"name": "CVE-2024-26804",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26804"
},
{
"name": "CVE-2024-26665",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26665"
},
{
"name": "CVE-2024-26747",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26747"
},
{
"name": "CVE-2024-26696",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26696"
},
{
"name": "CVE-2024-26698",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26698"
},
{
"name": "CVE-2024-26687",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26687"
},
{
"name": "CVE-2024-26778",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26778"
},
{
"name": "CVE-2024-26790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26790"
},
{
"name": "CVE-2024-26809",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26809"
},
{
"name": "CVE-2024-26673",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26673"
},
{
"name": "CVE-2024-26753",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26753"
},
{
"name": "CVE-2024-26751",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26751"
},
{
"name": "CVE-2024-26736",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26736"
},
{
"name": "CVE-2024-26641",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26641"
},
{
"name": "CVE-2024-26782",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26782"
},
{
"name": "CVE-2024-26848",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26848"
},
{
"name": "CVE-2023-52488",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52488"
},
{
"name": "CVE-2023-52627",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52627"
},
{
"name": "CVE-2023-52489",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52489"
},
{
"name": "CVE-2024-26897",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26897"
},
{
"name": "CVE-2024-26870",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26870"
},
{
"name": "CVE-2024-27044",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27044"
},
{
"name": "CVE-2024-26839",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26839"
},
{
"name": "CVE-2024-26863",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26863"
},
{
"name": "CVE-2024-26966",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26966"
},
{
"name": "CVE-2024-27025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27025"
},
{
"name": "CVE-2024-27047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27047"
},
{
"name": "CVE-2024-26845",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26845"
},
{
"name": "CVE-2024-27028",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27028"
},
{
"name": "CVE-2024-26970",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26970"
},
{
"name": "CVE-2024-26861",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26861"
},
{
"name": "CVE-2024-26895",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26895"
},
{
"name": "CVE-2024-26961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26961"
},
{
"name": "CVE-2024-26978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26978"
},
{
"name": "CVE-2024-26917",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26917"
},
{
"name": "CVE-2024-27013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27013"
},
{
"name": "CVE-2024-26840",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26840"
},
{
"name": "CVE-2023-52644",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52644"
},
{
"name": "CVE-2024-26910",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26910"
},
{
"name": "CVE-2024-26615",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26615"
},
{
"name": "CVE-2024-26931",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26931"
},
{
"name": "CVE-2024-26846",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26846"
},
{
"name": "CVE-2024-26958",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26958"
},
{
"name": "CVE-2024-27008",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27008"
},
{
"name": "CVE-2024-26610",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26610"
},
{
"name": "CVE-2024-26872",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26872"
},
{
"name": "CVE-2024-26875",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26875"
},
{
"name": "CVE-2024-26906",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26906"
},
{
"name": "CVE-2024-26843",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26843"
},
{
"name": "CVE-2024-26907",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26907"
},
{
"name": "CVE-2024-26925",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26925"
},
{
"name": "CVE-2024-26934",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26934"
},
{
"name": "CVE-2024-26957",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26957"
},
{
"name": "CVE-2024-26981",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26981"
},
{
"name": "CVE-2024-26889",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26889"
},
{
"name": "CVE-2024-27000",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27000"
},
{
"name": "CVE-2024-26833",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26833"
},
{
"name": "CVE-2024-26880",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26880"
},
{
"name": "CVE-2024-27388",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27388"
},
{
"name": "CVE-2024-26883",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26883"
},
{
"name": "CVE-2024-26644",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26644"
},
{
"name": "CVE-2024-26935",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26935"
},
{
"name": "CVE-2024-26974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26974"
},
{
"name": "CVE-2024-26965",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26965"
},
{
"name": "CVE-2024-26882",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26882"
},
{
"name": "CVE-2024-26984",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26984"
},
{
"name": "CVE-2024-27020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27020"
},
{
"name": "CVE-2024-26973",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26973"
},
{
"name": "CVE-2024-27059",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27059"
},
{
"name": "CVE-2024-26960",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26960"
},
{
"name": "CVE-2024-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27043"
},
{
"name": "CVE-2024-26820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26820"
},
{
"name": "CVE-2024-27038",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27038"
},
{
"name": "CVE-2024-27051",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27051"
},
{
"name": "CVE-2024-27073",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27073"
},
{
"name": "CVE-2024-26635",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26635"
},
{
"name": "CVE-2024-26950",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26950"
},
{
"name": "CVE-2024-26999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26999"
},
{
"name": "CVE-2023-52498",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52498"
},
{
"name": "CVE-2024-26874",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26874"
},
{
"name": "CVE-2023-52491",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52491"
},
{
"name": "CVE-2024-26956",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26956"
},
{
"name": "CVE-2024-26924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26924"
},
{
"name": "CVE-2024-24861",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24861"
},
{
"name": "CVE-2024-27004",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27004"
},
{
"name": "CVE-2024-26955",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26955"
},
{
"name": "CVE-2024-27052",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27052"
},
{
"name": "CVE-2024-27074",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27074"
},
{
"name": "CVE-2023-52650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52650"
},
{
"name": "CVE-2024-26808",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26808"
},
{
"name": "CVE-2024-26817",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26817"
},
{
"name": "CVE-2024-26857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26857"
},
{
"name": "CVE-2024-27001",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27001"
},
{
"name": "CVE-2024-26885",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26885"
},
{
"name": "CVE-2024-26878",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26878"
},
{
"name": "CVE-2024-26894",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26894"
},
{
"name": "CVE-2024-26835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26835"
},
{
"name": "CVE-2024-26976",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26976"
},
{
"name": "CVE-2024-26852",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26852"
},
{
"name": "CVE-2024-26859",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26859"
},
{
"name": "CVE-2024-26994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26994"
},
{
"name": "CVE-2024-26636",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26636"
},
{
"name": "CVE-2024-26898",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26898"
},
{
"name": "CVE-2023-52642",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52642"
},
{
"name": "CVE-2024-26969",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26969"
},
{
"name": "CVE-2023-52614",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52614"
},
{
"name": "CVE-2024-26877",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26877"
},
{
"name": "CVE-2024-26937",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26937"
},
{
"name": "CVE-2024-27030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27030"
},
{
"name": "CVE-2024-27065",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27065"
},
{
"name": "CVE-2024-26997",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26997"
},
{
"name": "CVE-2024-26922",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26922"
},
{
"name": "CVE-2024-26884",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26884"
},
{
"name": "CVE-2024-27076",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27076"
},
{
"name": "CVE-2024-26862",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26862"
},
{
"name": "CVE-2024-27077",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27077"
},
{
"name": "CVE-2024-27078",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27078"
},
{
"name": "CVE-2024-26825",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26825"
},
{
"name": "CVE-2024-26901",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26901"
},
{
"name": "CVE-2024-27046",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27046"
},
{
"name": "CVE-2024-26903",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26903"
},
{
"name": "CVE-2024-26993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26993"
},
{
"name": "CVE-2024-27024",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27024"
},
{
"name": "CVE-2024-27053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27053"
},
{
"name": "CVE-2024-27075",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27075"
},
{
"name": "CVE-2024-26891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26891"
},
{
"name": "CVE-2024-26951",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26951"
},
{
"name": "CVE-2024-26855",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26855"
},
{
"name": "CVE-2024-27045",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27045"
},
{
"name": "CVE-2024-26923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26923"
},
{
"name": "CVE-2024-26851",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26851"
},
{
"name": "CVE-2024-26926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26926"
},
{
"name": "CVE-2024-26988",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26988"
},
{
"name": "CVE-2023-52585",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52585"
},
{
"name": "CVE-2022-48655",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48655"
},
{
"name": "CVE-2023-52882",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52882"
},
{
"name": "CVE-2024-26900",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26900"
},
{
"name": "CVE-2024-27398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27398"
},
{
"name": "CVE-2024-27399",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27399"
},
{
"name": "CVE-2024-27401",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27401"
},
{
"name": "CVE-2024-35848",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35848"
},
{
"name": "CVE-2024-35947",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35947"
},
{
"name": "CVE-2024-36017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36017"
},
{
"name": "CVE-2024-36031",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36031"
},
{
"name": "CVE-2024-36883",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36883"
},
{
"name": "CVE-2024-36886",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36886"
},
{
"name": "CVE-2024-36889",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36889"
},
{
"name": "CVE-2024-36902",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36902"
},
{
"name": "CVE-2024-36904",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36904"
},
{
"name": "CVE-2024-36905",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36905"
},
{
"name": "CVE-2024-36916",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36916"
},
{
"name": "CVE-2024-36919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36919"
},
{
"name": "CVE-2024-36929",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36929"
},
{
"name": "CVE-2024-36933",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36933"
},
{
"name": "CVE-2024-36934",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36934"
},
{
"name": "CVE-2024-36939",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36939"
},
{
"name": "CVE-2024-36940",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36940"
},
{
"name": "CVE-2024-36941",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36941"
},
{
"name": "CVE-2024-36946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36946"
},
{
"name": "CVE-2024-36950",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36950"
},
{
"name": "CVE-2024-36953",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36953"
},
{
"name": "CVE-2024-36954",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36954"
},
{
"name": "CVE-2024-36957",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36957"
},
{
"name": "CVE-2024-36959",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36959"
},
{
"name": "CVE-2023-52656",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52656"
},
{
"name": "CVE-2023-52669",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52669"
},
{
"name": "CVE-2023-52679",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52679"
},
{
"name": "CVE-2023-52683",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52683"
},
{
"name": "CVE-2023-52686",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52686"
},
{
"name": "CVE-2023-52690",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52690"
},
{
"name": "CVE-2023-52691",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52691"
},
{
"name": "CVE-2023-52693",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52693"
},
{
"name": "CVE-2023-52694",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52694"
},
{
"name": "CVE-2023-52696",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52696"
},
{
"name": "CVE-2023-52698",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52698"
},
{
"name": "CVE-2023-52699",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52699"
},
{
"name": "CVE-2023-52880",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52880"
},
{
"name": "CVE-2024-27395",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27395"
},
{
"name": "CVE-2024-27396",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27396"
},
{
"name": "CVE-2024-27405",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27405"
},
{
"name": "CVE-2024-27410",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27410"
},
{
"name": "CVE-2024-27412",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27412"
},
{
"name": "CVE-2024-27413",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27413"
},
{
"name": "CVE-2024-27416",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27416"
},
{
"name": "CVE-2024-27417",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27417"
},
{
"name": "CVE-2024-27419",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27419"
},
{
"name": "CVE-2024-27431",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27431"
},
{
"name": "CVE-2024-27436",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27436"
},
{
"name": "CVE-2024-35789",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35789"
},
{
"name": "CVE-2024-35791",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35791"
},
{
"name": "CVE-2024-35796",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35796"
},
{
"name": "CVE-2024-35806",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35806"
},
{
"name": "CVE-2024-35809",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35809"
},
{
"name": "CVE-2024-35811",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35811"
},
{
"name": "CVE-2024-35813",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35813"
},
{
"name": "CVE-2024-35815",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35815"
},
{
"name": "CVE-2024-35821",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35821"
},
{
"name": "CVE-2024-35822",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35822"
},
{
"name": "CVE-2024-35823",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35823"
},
{
"name": "CVE-2024-35825",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35825"
},
{
"name": "CVE-2024-35828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35828"
},
{
"name": "CVE-2024-35829",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35829"
},
{
"name": "CVE-2024-35830",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35830"
},
{
"name": "CVE-2024-35833",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35833"
},
{
"name": "CVE-2024-35845",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35845"
},
{
"name": "CVE-2024-35847",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35847"
},
{
"name": "CVE-2024-35849",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35849"
},
{
"name": "CVE-2024-35852",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35852"
},
{
"name": "CVE-2024-35854",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35854"
},
{
"name": "CVE-2024-35877",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35877"
},
{
"name": "CVE-2024-35879",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35879"
},
{
"name": "CVE-2024-35895",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35895"
},
{
"name": "CVE-2024-35905",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35905"
},
{
"name": "CVE-2024-35915",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35915"
},
{
"name": "CVE-2024-35922",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35922"
},
{
"name": "CVE-2024-35930",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35930"
},
{
"name": "CVE-2024-35933",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35933"
},
{
"name": "CVE-2024-35935",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35935"
},
{
"name": "CVE-2024-35936",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35936"
},
{
"name": "CVE-2024-35940",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35940"
},
{
"name": "CVE-2024-35944",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35944"
},
{
"name": "CVE-2024-35950",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35950"
},
{
"name": "CVE-2024-35955",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35955"
},
{
"name": "CVE-2024-35967",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35967"
},
{
"name": "CVE-2024-35969",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35969"
},
{
"name": "CVE-2024-35973",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35973"
},
{
"name": "CVE-2024-35976",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35976"
},
{
"name": "CVE-2024-35978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35978"
},
{
"name": "CVE-2024-35982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35982"
},
{
"name": "CVE-2024-35984",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35984"
},
{
"name": "CVE-2024-35990",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35990"
},
{
"name": "CVE-2024-36006",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36006"
},
{
"name": "CVE-2024-36007",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36007"
},
{
"name": "CVE-2024-36014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36014"
},
{
"name": "CVE-2024-36015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36015"
},
{
"name": "CVE-2024-36016",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36016"
},
{
"name": "CVE-2023-52670",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52670"
},
{
"name": "CVE-2023-52675",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52675"
},
{
"name": "CVE-2024-35819",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35819"
},
{
"name": "CVE-2024-35835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35835"
},
{
"name": "CVE-2024-35837",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35837"
},
{
"name": "CVE-2024-35958",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35958"
},
{
"name": "CVE-2024-35960",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35960"
},
{
"name": "CVE-2024-35997",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35997"
},
{
"name": "CVE-2024-36020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36020"
},
{
"name": "CVE-2021-33630",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33630"
},
{
"name": "CVE-2023-52672",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52672"
},
{
"name": "CVE-2024-27414",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27414"
},
{
"name": "CVE-2024-31076",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-31076"
},
{
"name": "CVE-2024-33621",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33621"
},
{
"name": "CVE-2024-35785",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35785"
},
{
"name": "CVE-2024-35805",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35805"
},
{
"name": "CVE-2024-35807",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35807"
},
{
"name": "CVE-2024-35853",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35853"
},
{
"name": "CVE-2024-35855",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35855"
},
{
"name": "CVE-2024-35871",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35871"
},
{
"name": "CVE-2024-35884",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35884"
},
{
"name": "CVE-2024-35886",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35886"
},
{
"name": "CVE-2024-35888",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35888"
},
{
"name": "CVE-2024-35893",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35893"
},
{
"name": "CVE-2024-35896",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35896"
},
{
"name": "CVE-2024-35897",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35897"
},
{
"name": "CVE-2024-35898",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35898"
},
{
"name": "CVE-2024-35899",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35899"
},
{
"name": "CVE-2024-35900",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35900"
},
{
"name": "CVE-2024-35902",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35902"
},
{
"name": "CVE-2024-35910",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35910"
},
{
"name": "CVE-2024-35925",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35925"
},
{
"name": "CVE-2024-35934",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35934"
},
{
"name": "CVE-2024-35962",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35962"
},
{
"name": "CVE-2024-35983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35983"
},
{
"name": "CVE-2024-35988",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35988"
},
{
"name": "CVE-2024-35996",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35996"
},
{
"name": "CVE-2024-36004",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36004"
},
{
"name": "CVE-2024-36005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36005"
},
{
"name": "CVE-2024-36008",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36008"
},
{
"name": "CVE-2024-36286",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36286"
},
{
"name": "CVE-2024-36288",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36288"
},
{
"name": "CVE-2024-36960",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36960"
},
{
"name": "CVE-2024-36964",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36964"
},
{
"name": "CVE-2024-36971",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36971"
},
{
"name": "CVE-2024-37353",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37353"
},
{
"name": "CVE-2024-37356",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37356"
},
{
"name": "CVE-2024-38381",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38381"
},
{
"name": "CVE-2024-38549",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38549"
},
{
"name": "CVE-2024-38552",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38552"
},
{
"name": "CVE-2024-38558",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38558"
},
{
"name": "CVE-2024-38559",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38559"
},
{
"name": "CVE-2024-38560",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38560"
},
{
"name": "CVE-2024-38565",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38565"
},
{
"name": "CVE-2024-38567",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38567"
},
{
"name": "CVE-2024-38578",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38578"
},
{
"name": "CVE-2024-38579",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38579"
},
{
"name": "CVE-2024-38582",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38582"
},
{
"name": "CVE-2024-38583",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38583"
},
{
"name": "CVE-2024-38587",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38587"
},
{
"name": "CVE-2024-38589",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38589"
},
{
"name": "CVE-2024-38596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38596"
},
{
"name": "CVE-2024-38598",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38598"
},
{
"name": "CVE-2024-38599",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38599"
},
{
"name": "CVE-2024-38601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38601"
},
{
"name": "CVE-2024-38612",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38612"
},
{
"name": "CVE-2024-38618",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38618"
},
{
"name": "CVE-2024-38621",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38621"
},
{
"name": "CVE-2024-38627",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38627"
},
{
"name": "CVE-2024-38633",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38633"
},
{
"name": "CVE-2024-38634",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38634"
},
{
"name": "CVE-2024-38637",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38637"
},
{
"name": "CVE-2024-38659",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38659"
},
{
"name": "CVE-2024-38780",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38780"
},
{
"name": "CVE-2024-39292",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39292"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0527",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-06-28T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de Debian LTS. Elles permettent \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et un d\u00e9ni de service.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Debian LTS",
"vendor_advisories": [
{
"published_at": "2024-06-25",
"title": "Bulletin de s\u00e9curit\u00e9 Debian LTS DLA-3840-1",
"url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html"
},
{
"published_at": "2024-06-25",
"title": "Bulletin de s\u00e9curit\u00e9 Debian LTS DLA-3842-1",
"url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html"
},
{
"published_at": "2024-06-25",
"title": "Bulletin de s\u00e9curit\u00e9 Debian LTS DLA-3843-1",
"url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00019.html"
},
{
"published_at": "2024-06-25",
"title": "Bulletin de s\u00e9curit\u00e9 Debian LTS DLA-3841-1",
"url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html"
}
]
}
CERTFR-2024-AVI-0301
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Certaines d'entre elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, une exécution de code arbitraire et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 18.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 20.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 14.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 23.10",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 22.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-52436",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52436"
},
{
"name": "CVE-2023-3006",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3006"
},
{
"name": "CVE-2023-52448",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52448"
},
{
"name": "CVE-2023-52456",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52456"
},
{
"name": "CVE-2023-46838",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46838"
},
{
"name": "CVE-2024-26586",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26586"
},
{
"name": "CVE-2023-52429",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52429"
},
{
"name": "CVE-2023-1194",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1194"
},
{
"name": "CVE-2023-2002",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2002"
},
{
"name": "CVE-2023-52480",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52480"
},
{
"name": "CVE-2024-26589",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26589"
},
{
"name": "CVE-2024-26597",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26597"
},
{
"name": "CVE-2024-24855",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24855"
},
{
"name": "CVE-2023-52441",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52441"
},
{
"name": "CVE-2023-52454",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52454"
},
{
"name": "CVE-2023-23000",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23000"
},
{
"name": "CVE-2024-26631",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26631"
},
{
"name": "CVE-2023-52340",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52340"
},
{
"name": "CVE-2024-26598",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26598"
},
{
"name": "CVE-2023-52435",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52435"
},
{
"name": "CVE-2023-32254",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32254"
},
{
"name": "CVE-2023-52462",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52462"
},
{
"name": "CVE-2023-52609",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52609"
},
{
"name": "CVE-2023-52469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52469"
},
{
"name": "CVE-2023-52451",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52451"
},
{
"name": "CVE-2024-0607",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0607"
},
{
"name": "CVE-2024-24860",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24860"
},
{
"name": "CVE-2023-38430",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38430"
},
{
"name": "CVE-2023-52438",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52438"
},
{
"name": "CVE-2023-32258",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32258"
},
{
"name": "CVE-2023-52439",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52439"
},
{
"name": "CVE-2023-52470",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52470"
},
{
"name": "CVE-2023-52445",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52445"
},
{
"name": "CVE-2024-23850",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23850"
},
{
"name": "CVE-2024-0775",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0775"
},
{
"name": "CVE-2023-51781",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51781"
},
{
"name": "CVE-2023-52612",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52612"
},
{
"name": "CVE-2023-52434",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52434"
},
{
"name": "CVE-2024-23851",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23851"
},
{
"name": "CVE-2023-3867",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3867"
},
{
"name": "CVE-2023-50431",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50431"
},
{
"name": "CVE-2023-52458",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52458"
},
{
"name": "CVE-2023-34256",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34256"
},
{
"name": "CVE-2024-26633",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26633"
},
{
"name": "CVE-2024-26591",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26591"
},
{
"name": "CVE-2023-52464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52464"
},
{
"name": "CVE-2023-52610",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52610"
},
{
"name": "CVE-2023-4132",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4132"
},
{
"name": "CVE-2023-38427",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38427"
},
{
"name": "CVE-2024-1086",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1086"
},
{
"name": "CVE-2023-52463",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52463"
},
{
"name": "CVE-2023-52467",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52467"
},
{
"name": "CVE-2023-39197",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39197"
},
{
"name": "CVE-2023-52443",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52443"
},
{
"name": "CVE-2023-52442",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52442"
},
{
"name": "CVE-2024-22705",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22705"
},
{
"name": "CVE-2023-38431",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38431"
},
{
"name": "CVE-2023-6121",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6121"
},
{
"name": "CVE-2023-6610",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6610"
},
{
"name": "CVE-2023-52457",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52457"
},
{
"name": "CVE-2023-52449",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52449"
},
{
"name": "CVE-2023-52444",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52444"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0301",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-04-12T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003ele noyau Linux d\u0027Ubuntu\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9\ndes donn\u00e9es, une ex\u00e9cution de code arbitraire et une \u00e9l\u00e9vation de\nprivil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-6726-1 du 09 avril 2024",
"url": "https://ubuntu.com/security/notices/USN-6726-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-6725-1 du 09 avril 2024",
"url": "https://ubuntu.com/security/notices/USN-6725-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-6701-4 du 09 avril 2024",
"url": "https://ubuntu.com/security/notices/USN-6701-4"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-6724-1 du 09 avril 2024",
"url": "https://ubuntu.com/security/notices/USN-6724-1"
}
]
}
CERTFR-2024-AVI-0577
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Red Hat. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 8.6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian 8 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems 8 s390x | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 8 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - TUS 8.6 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for IBM z Systems 9 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.0 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time 8 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 9.4 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server for ARM 64 - 4 years of updates 9.0 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.4 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time for x86_64 - 4 years of updates 9.0 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server for ARM 64 - 4 years of updates 9.4 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 9 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.4 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 9.4 s390x | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for Power, little endian 9 ppc64le | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 9.4 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time 9 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for ARM 64 9 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.4 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.0 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time for NFV for x86_64 - 4 years of updates 9.0 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 8 aarch64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for ARM 64 8 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.4 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time for NFV 9 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time for NFV 8 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 9.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time for x86_64 - 4 years of updates 9.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server for IBM z Systems - 4 years of updates 9.0 s390x | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for x86_64 8 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems 9 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time for NFV for x86_64 - 4 years of updates 9.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian 9 ppc64le | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 9.4 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for Power, little endian 8 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server for IBM z Systems - 4 years of updates 9.4 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.4 ppc64le | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for x86_64 9 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 9 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6 x86_64 |
| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Red Hat Enterprise Linux Server - AUS 8.6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian 8 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems 8 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 8 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - TUS 8.6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for IBM z Systems 9 s390x",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.0 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time 8 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 9.4 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server for ARM 64 - 4 years of updates 9.0 aarch64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.4 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time for x86_64 - 4 years of updates 9.0 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server for ARM 64 - 4 years of updates 9.4 aarch64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 9 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 9.4 s390x",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for Power, little endian 9 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 9.4 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time 9 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for ARM 64 9 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.4 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.0 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time for NFV for x86_64 - 4 years of updates 9.0 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 8 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for ARM 64 8 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.4 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time for NFV 9 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time for NFV 8 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 9.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time for x86_64 - 4 years of updates 9.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server for IBM z Systems - 4 years of updates 9.0 s390x",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for x86_64 8 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems 9 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time for NFV for x86_64 - 4 years of updates 9.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian 9 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 9.4 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for Power, little endian 8 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server for IBM z Systems - 4 years of updates 9.4 s390x",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.4 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for x86_64 9 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 9 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2023-52675",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52675"
},
{
"name": "CVE-2024-26656",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26656"
},
{
"name": "CVE-2024-26974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26974"
},
{
"name": "CVE-2024-26585",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26585"
},
{
"name": "CVE-2024-27397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27397"
},
{
"name": "CVE-2024-35854",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35854"
},
{
"name": "CVE-2023-52878",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52878"
},
{
"name": "CVE-2024-36886",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36886"
},
{
"name": "CVE-2023-52669",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52669"
},
{
"name": "CVE-2024-36004",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36004"
},
{
"name": "CVE-2024-26859",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26859"
},
{
"name": "CVE-2024-35959",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35959"
},
{
"name": "CVE-2024-26673",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26673"
},
{
"name": "CVE-2024-35855",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35855"
},
{
"name": "CVE-2024-26801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26801"
},
{
"name": "CVE-2024-36007",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36007"
},
{
"name": "CVE-2021-47311",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47311"
},
{
"name": "CVE-2024-0193",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0193"
},
{
"name": "CVE-2024-36952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36952"
},
{
"name": "CVE-2024-26598",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26598"
},
{
"name": "CVE-2024-35852",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35852"
},
{
"name": "CVE-2023-52781",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52781"
},
{
"name": "CVE-2024-35845",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35845"
},
{
"name": "CVE-2021-47073",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47073"
},
{
"name": "CVE-2021-47293",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47293"
},
{
"name": "CVE-2024-26804",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26804"
},
{
"name": "CVE-2023-52686",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52686"
},
{
"name": "CVE-2024-36005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36005"
},
{
"name": "CVE-2024-27393",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27393"
},
{
"name": "CVE-2021-47236",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47236"
},
{
"name": "CVE-2024-35890",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35890"
},
{
"name": "CVE-2023-52877",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52877"
},
{
"name": "CVE-2021-47400",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47400"
},
{
"name": "CVE-2024-26826",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26826"
},
{
"name": "CVE-2024-26583",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26583"
},
{
"name": "CVE-2024-35888",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35888"
},
{
"name": "CVE-2023-52700",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52700"
},
{
"name": "CVE-2021-47495",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47495"
},
{
"name": "CVE-2024-26675",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26675"
},
{
"name": "CVE-2024-26906",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26906"
},
{
"name": "CVE-2024-26584",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26584"
},
{
"name": "CVE-2024-35870",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35870"
},
{
"name": "CVE-2024-35969",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35969"
},
{
"name": "CVE-2024-35835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35835"
},
{
"name": "CVE-2024-26735",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26735"
},
{
"name": "CVE-2023-52881",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52881"
},
{
"name": "CVE-2023-52434",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52434"
},
{
"name": "CVE-2021-46972",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46972"
},
{
"name": "CVE-2022-1789",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1789"
},
{
"name": "CVE-2023-52667",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52667"
},
{
"name": "CVE-2023-52703",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52703"
},
{
"name": "CVE-2024-26759",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26759"
},
{
"name": "CVE-2023-52464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52464"
},
{
"name": "CVE-2023-52813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52813"
},
{
"name": "CVE-2024-35838",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35838"
},
{
"name": "CVE-2023-52615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52615"
},
{
"name": "CVE-2023-52560",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52560"
},
{
"name": "CVE-2021-47069",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47069"
},
{
"name": "CVE-2024-35960",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35960"
},
{
"name": "CVE-2020-26555",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26555"
},
{
"name": "CVE-2024-35789",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35789"
},
{
"name": "CVE-2023-52835",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52835"
},
{
"name": "CVE-2024-26982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26982"
},
{
"name": "CVE-2021-47310",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47310"
},
{
"name": "CVE-2023-52626",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52626"
},
{
"name": "CVE-2024-35958",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35958"
},
{
"name": "CVE-2021-47456",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47456"
},
{
"name": "CVE-2021-47356",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47356"
},
{
"name": "CVE-2021-47353",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47353"
},
{
"name": "CVE-2023-5090",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5090"
},
{
"name": "CVE-2024-27410",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27410"
},
{
"name": "CVE-2021-46909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46909"
},
{
"name": "CVE-2024-35853",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35853"
},
{
"name": "CVE-2024-26907",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26907"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0577",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-07-12T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de Red Hat. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Red Hat",
"vendor_advisories": [
{
"published_at": "2024-07-10",
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2024:4447",
"url": "https://access.redhat.com/errata/RHSA-2024:4447"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2024:4412",
"url": "https://access.redhat.com/errata/RHSA-2024:4412"
},
{
"published_at": "2024-07-02",
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2024:4211",
"url": "https://access.redhat.com/errata/RHSA-2024:4211"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2024:4415",
"url": "https://access.redhat.com/errata/RHSA-2024:4415"
},
{
"published_at": "2024-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2024:4352",
"url": "https://access.redhat.com/errata/RHSA-2024:4352"
},
{
"published_at": "2024-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2024:4349",
"url": "https://access.redhat.com/errata/RHSA-2024:4349"
}
]
}
CERTFR-2024-AVI-0527
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Debian LTS. Elles permettent à un attaquant de provoquer une élévation de privilèges, une atteinte à la confidentialité des données et un déni de service.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Debian | N/A | Debian LTS buster versions antérieures à 5.10.209-2~deb10u1 | ||
| Debian | N/A | Debian LTS buster versions antérieures à 5.10.218-1~deb10u1 | ||
| Debian | N/A | Debian LTS buster versions antérieures à 5.10.216-1~deb10u1 | ||
| Debian | N/A | Debian LTS buster versions antérieures à 4.19.316-1 |
| Title | Publication Time | Tags | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Debian LTS buster versions ant\u00e9rieures \u00e0 5.10.209-2~deb10u1",
"product": {
"name": "N/A",
"vendor": {
"name": "Debian",
"scada": false
}
}
},
{
"description": "Debian LTS buster versions ant\u00e9rieures \u00e0 5.10.218-1~deb10u1",
"product": {
"name": "N/A",
"vendor": {
"name": "Debian",
"scada": false
}
}
},
{
"description": "Debian LTS buster versions ant\u00e9rieures \u00e0 5.10.216-1~deb10u1",
"product": {
"name": "N/A",
"vendor": {
"name": "Debian",
"scada": false
}
}
},
{
"description": "Debian LTS buster versions ant\u00e9rieures \u00e0 4.19.316-1",
"product": {
"name": "N/A",
"vendor": {
"name": "Debian",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2022-38096",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38096"
},
{
"name": "CVE-2023-0386",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0386"
},
{
"name": "CVE-2023-39198",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39198"
},
{
"name": "CVE-2023-6606",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6606"
},
{
"name": "CVE-2023-51779",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51779"
},
{
"name": "CVE-2023-46838",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46838"
},
{
"name": "CVE-2023-6040",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6040"
},
{
"name": "CVE-2023-6536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6536"
},
{
"name": "CVE-2023-6356",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6356"
},
{
"name": "CVE-2023-6535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6535"
},
{
"name": "CVE-2024-0646",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0646"
},
{
"name": "CVE-2024-0607",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0607"
},
{
"name": "CVE-2024-0565",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0565"
},
{
"name": "CVE-2023-6915",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6915"
},
{
"name": "CVE-2024-0340",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0340"
},
{
"name": "CVE-2023-47233",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47233"
},
{
"name": "CVE-2024-24860",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24860"
},
{
"name": "CVE-2024-1086",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1086"
},
{
"name": "CVE-2023-28746",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28746"
},
{
"name": "CVE-2023-52454",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52454"
},
{
"name": "CVE-2024-26600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26600"
},
{
"name": "CVE-2023-52467",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52467"
},
{
"name": "CVE-2023-52451",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52451"
},
{
"name": "CVE-2023-52436",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52436"
},
{
"name": "CVE-2023-52445",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52445"
},
{
"name": "CVE-2023-52597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52597"
},
{
"name": "CVE-2024-26598",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26598"
},
{
"name": "CVE-2023-52462",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52462"
},
{
"name": "CVE-2023-52443",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52443"
},
{
"name": "CVE-2023-52469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52469"
},
{
"name": "CVE-2023-52598",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52598"
},
{
"name": "CVE-2023-52470",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52470"
},
{
"name": "CVE-2023-52601",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52601"
},
{
"name": "CVE-2023-52439",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52439"
},
{
"name": "CVE-2023-52438",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52438"
},
{
"name": "CVE-2023-52464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52464"
},
{
"name": "CVE-2023-52600",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52600"
},
{
"name": "CVE-2023-52458",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52458"
},
{
"name": "CVE-2023-52602",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52602"
},
{
"name": "CVE-2024-26625",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26625"
},
{
"name": "CVE-2024-26627",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26627"
},
{
"name": "CVE-2023-52463",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52463"
},
{
"name": "CVE-2023-52447",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52447"
},
{
"name": "CVE-2023-52449",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52449"
},
{
"name": "CVE-2024-26581",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26581"
},
{
"name": "CVE-2023-52457",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52457"
},
{
"name": "CVE-2023-52606",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52606"
},
{
"name": "CVE-2023-52604",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52604"
},
{
"name": "CVE-2023-52587",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52587"
},
{
"name": "CVE-2023-52448",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52448"
},
{
"name": "CVE-2023-52599",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52599"
},
{
"name": "CVE-2023-52444",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52444"
},
{
"name": "CVE-2023-52583",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52583"
},
{
"name": "CVE-2023-52603",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52603"
},
{
"name": "CVE-2023-52456",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52456"
},
{
"name": "CVE-2023-52607",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52607"
},
{
"name": "CVE-2023-52594",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52594"
},
{
"name": "CVE-2024-26601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26601"
},
{
"name": "CVE-2023-52595",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52595"
},
{
"name": "CVE-2024-23849",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23849"
},
{
"name": "CVE-2024-26597",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26597"
},
{
"name": "CVE-2024-26602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26602"
},
{
"name": "CVE-2023-52340",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52340"
},
{
"name": "CVE-2024-23850",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23850"
},
{
"name": "CVE-2024-26622",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26622"
},
{
"name": "CVE-2024-23851",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23851"
},
{
"name": "CVE-2024-1151",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1151"
},
{
"name": "CVE-2023-6270",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6270"
},
{
"name": "CVE-2024-26593",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26593"
},
{
"name": "CVE-2023-52429",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52429"
},
{
"name": "CVE-2023-52482",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52482"
},
{
"name": "CVE-2024-26586",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26586"
},
{
"name": "CVE-2022-48627",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48627"
},
{
"name": "CVE-2024-26633",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26633"
},
{
"name": "CVE-2023-52434",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52434"
},
{
"name": "CVE-2023-52609",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52609"
},
{
"name": "CVE-2023-52435",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52435"
},
{
"name": "CVE-2023-52612",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52612"
},
{
"name": "CVE-2024-26642",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26642"
},
{
"name": "CVE-2023-52617",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52617"
},
{
"name": "CVE-2024-26645",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26645"
},
{
"name": "CVE-2024-0841",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0841"
},
{
"name": "CVE-2024-26695",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26695"
},
{
"name": "CVE-2024-26654",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26654"
},
{
"name": "CVE-2023-52615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52615"
},
{
"name": "CVE-2024-26659",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26659"
},
{
"name": "CVE-2023-52486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52486"
},
{
"name": "CVE-2023-52628",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52628"
},
{
"name": "CVE-2023-52493",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52493"
},
{
"name": "CVE-2024-26614",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26614"
},
{
"name": "CVE-2023-52637",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52637"
},
{
"name": "CVE-2023-52497",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52497"
},
{
"name": "CVE-2023-52492",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52492"
},
{
"name": "CVE-2024-25739",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25739"
},
{
"name": "CVE-2024-22099",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22099"
},
{
"name": "CVE-2024-26664",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26664"
},
{
"name": "CVE-2023-52623",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52623"
},
{
"name": "CVE-2023-52619",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52619"
},
{
"name": "CVE-2024-26651",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26651"
},
{
"name": "CVE-2023-7042",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7042"
},
{
"name": "CVE-2024-26707",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26707"
},
{
"name": "CVE-2024-26754",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26754"
},
{
"name": "CVE-2024-26795",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26795"
},
{
"name": "CVE-2024-26697",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26697"
},
{
"name": "CVE-2024-26704",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26704"
},
{
"name": "CVE-2024-26720",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26720"
},
{
"name": "CVE-2023-52622",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52622"
},
{
"name": "CVE-2024-26689",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26689"
},
{
"name": "CVE-2024-26727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26727"
},
{
"name": "CVE-2024-26671",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26671"
},
{
"name": "CVE-2024-26748",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26748"
},
{
"name": "CVE-2024-26776",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26776"
},
{
"name": "CVE-2024-26606",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26606"
},
{
"name": "CVE-2024-26702",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26702"
},
{
"name": "CVE-2024-26766",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26766"
},
{
"name": "CVE-2024-26814",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26814"
},
{
"name": "CVE-2024-26685",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26685"
},
{
"name": "CVE-2024-26771",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26771"
},
{
"name": "CVE-2024-26810",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26810"
},
{
"name": "CVE-2024-26801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26801"
},
{
"name": "CVE-2024-26787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26787"
},
{
"name": "CVE-2024-26781",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26781"
},
{
"name": "CVE-2024-26663",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26663"
},
{
"name": "CVE-2024-26675",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26675"
},
{
"name": "CVE-2024-26752",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26752"
},
{
"name": "CVE-2024-26743",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26743"
},
{
"name": "CVE-2024-26805",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26805"
},
{
"name": "CVE-2024-26773",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26773"
},
{
"name": "CVE-2023-52618",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52618"
},
{
"name": "CVE-2024-26712",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26712"
},
{
"name": "CVE-2024-26793",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26793"
},
{
"name": "CVE-2024-24858",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24858"
},
{
"name": "CVE-2023-52616",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52616"
},
{
"name": "CVE-2024-26813",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26813"
},
{
"name": "CVE-2024-26764",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26764"
},
{
"name": "CVE-2024-27437",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27437"
},
{
"name": "CVE-2024-26735",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26735"
},
{
"name": "CVE-2024-26684",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26684"
},
{
"name": "CVE-2024-24857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24857"
},
{
"name": "CVE-2024-26679",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26679"
},
{
"name": "CVE-2024-26816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26816"
},
{
"name": "CVE-2024-26749",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26749"
},
{
"name": "CVE-2024-26688",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26688"
},
{
"name": "CVE-2024-26744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26744"
},
{
"name": "CVE-2024-26640",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26640"
},
{
"name": "CVE-2024-26763",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26763"
},
{
"name": "CVE-2024-26722",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26722"
},
{
"name": "CVE-2024-26777",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26777"
},
{
"name": "CVE-2024-26733",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26733"
},
{
"name": "CVE-2024-26779",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26779"
},
{
"name": "CVE-2023-52620",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52620"
},
{
"name": "CVE-2024-26772",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26772"
},
{
"name": "CVE-2024-26791",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26791"
},
{
"name": "CVE-2023-52635",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52635"
},
{
"name": "CVE-2024-26788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26788"
},
{
"name": "CVE-2024-26812",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26812"
},
{
"name": "CVE-2024-26643",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26643"
},
{
"name": "CVE-2024-26804",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26804"
},
{
"name": "CVE-2024-26665",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26665"
},
{
"name": "CVE-2024-26747",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26747"
},
{
"name": "CVE-2024-26696",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26696"
},
{
"name": "CVE-2024-26698",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26698"
},
{
"name": "CVE-2024-26687",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26687"
},
{
"name": "CVE-2024-26778",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26778"
},
{
"name": "CVE-2024-26790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26790"
},
{
"name": "CVE-2024-26809",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26809"
},
{
"name": "CVE-2024-26673",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26673"
},
{
"name": "CVE-2024-26753",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26753"
},
{
"name": "CVE-2024-26751",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26751"
},
{
"name": "CVE-2024-26736",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26736"
},
{
"name": "CVE-2024-26641",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26641"
},
{
"name": "CVE-2024-26782",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26782"
},
{
"name": "CVE-2024-26848",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26848"
},
{
"name": "CVE-2023-52488",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52488"
},
{
"name": "CVE-2023-52627",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52627"
},
{
"name": "CVE-2023-52489",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52489"
},
{
"name": "CVE-2024-26897",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26897"
},
{
"name": "CVE-2024-26870",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26870"
},
{
"name": "CVE-2024-27044",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27044"
},
{
"name": "CVE-2024-26839",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26839"
},
{
"name": "CVE-2024-26863",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26863"
},
{
"name": "CVE-2024-26966",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26966"
},
{
"name": "CVE-2024-27025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27025"
},
{
"name": "CVE-2024-27047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27047"
},
{
"name": "CVE-2024-26845",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26845"
},
{
"name": "CVE-2024-27028",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27028"
},
{
"name": "CVE-2024-26970",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26970"
},
{
"name": "CVE-2024-26861",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26861"
},
{
"name": "CVE-2024-26895",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26895"
},
{
"name": "CVE-2024-26961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26961"
},
{
"name": "CVE-2024-26978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26978"
},
{
"name": "CVE-2024-26917",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26917"
},
{
"name": "CVE-2024-27013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27013"
},
{
"name": "CVE-2024-26840",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26840"
},
{
"name": "CVE-2023-52644",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52644"
},
{
"name": "CVE-2024-26910",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26910"
},
{
"name": "CVE-2024-26615",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26615"
},
{
"name": "CVE-2024-26931",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26931"
},
{
"name": "CVE-2024-26846",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26846"
},
{
"name": "CVE-2024-26958",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26958"
},
{
"name": "CVE-2024-27008",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27008"
},
{
"name": "CVE-2024-26610",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26610"
},
{
"name": "CVE-2024-26872",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26872"
},
{
"name": "CVE-2024-26875",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26875"
},
{
"name": "CVE-2024-26906",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26906"
},
{
"name": "CVE-2024-26843",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26843"
},
{
"name": "CVE-2024-26907",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26907"
},
{
"name": "CVE-2024-26925",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26925"
},
{
"name": "CVE-2024-26934",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26934"
},
{
"name": "CVE-2024-26957",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26957"
},
{
"name": "CVE-2024-26981",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26981"
},
{
"name": "CVE-2024-26889",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26889"
},
{
"name": "CVE-2024-27000",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27000"
},
{
"name": "CVE-2024-26833",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26833"
},
{
"name": "CVE-2024-26880",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26880"
},
{
"name": "CVE-2024-27388",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27388"
},
{
"name": "CVE-2024-26883",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26883"
},
{
"name": "CVE-2024-26644",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26644"
},
{
"name": "CVE-2024-26935",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26935"
},
{
"name": "CVE-2024-26974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26974"
},
{
"name": "CVE-2024-26965",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26965"
},
{
"name": "CVE-2024-26882",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26882"
},
{
"name": "CVE-2024-26984",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26984"
},
{
"name": "CVE-2024-27020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27020"
},
{
"name": "CVE-2024-26973",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26973"
},
{
"name": "CVE-2024-27059",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27059"
},
{
"name": "CVE-2024-26960",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26960"
},
{
"name": "CVE-2024-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27043"
},
{
"name": "CVE-2024-26820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26820"
},
{
"name": "CVE-2024-27038",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27038"
},
{
"name": "CVE-2024-27051",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27051"
},
{
"name": "CVE-2024-27073",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27073"
},
{
"name": "CVE-2024-26635",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26635"
},
{
"name": "CVE-2024-26950",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26950"
},
{
"name": "CVE-2024-26999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26999"
},
{
"name": "CVE-2023-52498",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52498"
},
{
"name": "CVE-2024-26874",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26874"
},
{
"name": "CVE-2023-52491",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52491"
},
{
"name": "CVE-2024-26956",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26956"
},
{
"name": "CVE-2024-26924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26924"
},
{
"name": "CVE-2024-24861",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24861"
},
{
"name": "CVE-2024-27004",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27004"
},
{
"name": "CVE-2024-26955",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26955"
},
{
"name": "CVE-2024-27052",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27052"
},
{
"name": "CVE-2024-27074",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27074"
},
{
"name": "CVE-2023-52650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52650"
},
{
"name": "CVE-2024-26808",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26808"
},
{
"name": "CVE-2024-26817",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26817"
},
{
"name": "CVE-2024-26857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26857"
},
{
"name": "CVE-2024-27001",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27001"
},
{
"name": "CVE-2024-26885",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26885"
},
{
"name": "CVE-2024-26878",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26878"
},
{
"name": "CVE-2024-26894",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26894"
},
{
"name": "CVE-2024-26835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26835"
},
{
"name": "CVE-2024-26976",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26976"
},
{
"name": "CVE-2024-26852",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26852"
},
{
"name": "CVE-2024-26859",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26859"
},
{
"name": "CVE-2024-26994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26994"
},
{
"name": "CVE-2024-26636",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26636"
},
{
"name": "CVE-2024-26898",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26898"
},
{
"name": "CVE-2023-52642",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52642"
},
{
"name": "CVE-2024-26969",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26969"
},
{
"name": "CVE-2023-52614",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52614"
},
{
"name": "CVE-2024-26877",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26877"
},
{
"name": "CVE-2024-26937",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26937"
},
{
"name": "CVE-2024-27030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27030"
},
{
"name": "CVE-2024-27065",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27065"
},
{
"name": "CVE-2024-26997",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26997"
},
{
"name": "CVE-2024-26922",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26922"
},
{
"name": "CVE-2024-26884",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26884"
},
{
"name": "CVE-2024-27076",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27076"
},
{
"name": "CVE-2024-26862",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26862"
},
{
"name": "CVE-2024-27077",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27077"
},
{
"name": "CVE-2024-27078",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27078"
},
{
"name": "CVE-2024-26825",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26825"
},
{
"name": "CVE-2024-26901",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26901"
},
{
"name": "CVE-2024-27046",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27046"
},
{
"name": "CVE-2024-26903",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26903"
},
{
"name": "CVE-2024-26993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26993"
},
{
"name": "CVE-2024-27024",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27024"
},
{
"name": "CVE-2024-27053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27053"
},
{
"name": "CVE-2024-27075",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27075"
},
{
"name": "CVE-2024-26891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26891"
},
{
"name": "CVE-2024-26951",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26951"
},
{
"name": "CVE-2024-26855",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26855"
},
{
"name": "CVE-2024-27045",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27045"
},
{
"name": "CVE-2024-26923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26923"
},
{
"name": "CVE-2024-26851",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26851"
},
{
"name": "CVE-2024-26926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26926"
},
{
"name": "CVE-2024-26988",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26988"
},
{
"name": "CVE-2023-52585",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52585"
},
{
"name": "CVE-2022-48655",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48655"
},
{
"name": "CVE-2023-52882",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52882"
},
{
"name": "CVE-2024-26900",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26900"
},
{
"name": "CVE-2024-27398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27398"
},
{
"name": "CVE-2024-27399",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27399"
},
{
"name": "CVE-2024-27401",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27401"
},
{
"name": "CVE-2024-35848",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35848"
},
{
"name": "CVE-2024-35947",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35947"
},
{
"name": "CVE-2024-36017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36017"
},
{
"name": "CVE-2024-36031",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36031"
},
{
"name": "CVE-2024-36883",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36883"
},
{
"name": "CVE-2024-36886",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36886"
},
{
"name": "CVE-2024-36889",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36889"
},
{
"name": "CVE-2024-36902",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36902"
},
{
"name": "CVE-2024-36904",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36904"
},
{
"name": "CVE-2024-36905",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36905"
},
{
"name": "CVE-2024-36916",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36916"
},
{
"name": "CVE-2024-36919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36919"
},
{
"name": "CVE-2024-36929",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36929"
},
{
"name": "CVE-2024-36933",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36933"
},
{
"name": "CVE-2024-36934",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36934"
},
{
"name": "CVE-2024-36939",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36939"
},
{
"name": "CVE-2024-36940",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36940"
},
{
"name": "CVE-2024-36941",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36941"
},
{
"name": "CVE-2024-36946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36946"
},
{
"name": "CVE-2024-36950",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36950"
},
{
"name": "CVE-2024-36953",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36953"
},
{
"name": "CVE-2024-36954",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36954"
},
{
"name": "CVE-2024-36957",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36957"
},
{
"name": "CVE-2024-36959",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36959"
},
{
"name": "CVE-2023-52656",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52656"
},
{
"name": "CVE-2023-52669",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52669"
},
{
"name": "CVE-2023-52679",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52679"
},
{
"name": "CVE-2023-52683",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52683"
},
{
"name": "CVE-2023-52686",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52686"
},
{
"name": "CVE-2023-52690",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52690"
},
{
"name": "CVE-2023-52691",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52691"
},
{
"name": "CVE-2023-52693",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52693"
},
{
"name": "CVE-2023-52694",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52694"
},
{
"name": "CVE-2023-52696",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52696"
},
{
"name": "CVE-2023-52698",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52698"
},
{
"name": "CVE-2023-52699",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52699"
},
{
"name": "CVE-2023-52880",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52880"
},
{
"name": "CVE-2024-27395",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27395"
},
{
"name": "CVE-2024-27396",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27396"
},
{
"name": "CVE-2024-27405",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27405"
},
{
"name": "CVE-2024-27410",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27410"
},
{
"name": "CVE-2024-27412",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27412"
},
{
"name": "CVE-2024-27413",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27413"
},
{
"name": "CVE-2024-27416",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27416"
},
{
"name": "CVE-2024-27417",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27417"
},
{
"name": "CVE-2024-27419",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27419"
},
{
"name": "CVE-2024-27431",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27431"
},
{
"name": "CVE-2024-27436",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27436"
},
{
"name": "CVE-2024-35789",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35789"
},
{
"name": "CVE-2024-35791",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35791"
},
{
"name": "CVE-2024-35796",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35796"
},
{
"name": "CVE-2024-35806",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35806"
},
{
"name": "CVE-2024-35809",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35809"
},
{
"name": "CVE-2024-35811",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35811"
},
{
"name": "CVE-2024-35813",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35813"
},
{
"name": "CVE-2024-35815",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35815"
},
{
"name": "CVE-2024-35821",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35821"
},
{
"name": "CVE-2024-35822",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35822"
},
{
"name": "CVE-2024-35823",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35823"
},
{
"name": "CVE-2024-35825",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35825"
},
{
"name": "CVE-2024-35828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35828"
},
{
"name": "CVE-2024-35829",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35829"
},
{
"name": "CVE-2024-35830",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35830"
},
{
"name": "CVE-2024-35833",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35833"
},
{
"name": "CVE-2024-35845",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35845"
},
{
"name": "CVE-2024-35847",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35847"
},
{
"name": "CVE-2024-35849",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35849"
},
{
"name": "CVE-2024-35852",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35852"
},
{
"name": "CVE-2024-35854",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35854"
},
{
"name": "CVE-2024-35877",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35877"
},
{
"name": "CVE-2024-35879",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35879"
},
{
"name": "CVE-2024-35895",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35895"
},
{
"name": "CVE-2024-35905",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35905"
},
{
"name": "CVE-2024-35915",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35915"
},
{
"name": "CVE-2024-35922",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35922"
},
{
"name": "CVE-2024-35930",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35930"
},
{
"name": "CVE-2024-35933",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35933"
},
{
"name": "CVE-2024-35935",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35935"
},
{
"name": "CVE-2024-35936",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35936"
},
{
"name": "CVE-2024-35940",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35940"
},
{
"name": "CVE-2024-35944",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35944"
},
{
"name": "CVE-2024-35950",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35950"
},
{
"name": "CVE-2024-35955",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35955"
},
{
"name": "CVE-2024-35967",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35967"
},
{
"name": "CVE-2024-35969",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35969"
},
{
"name": "CVE-2024-35973",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35973"
},
{
"name": "CVE-2024-35976",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35976"
},
{
"name": "CVE-2024-35978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35978"
},
{
"name": "CVE-2024-35982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35982"
},
{
"name": "CVE-2024-35984",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35984"
},
{
"name": "CVE-2024-35990",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35990"
},
{
"name": "CVE-2024-36006",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36006"
},
{
"name": "CVE-2024-36007",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36007"
},
{
"name": "CVE-2024-36014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36014"
},
{
"name": "CVE-2024-36015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36015"
},
{
"name": "CVE-2024-36016",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36016"
},
{
"name": "CVE-2023-52670",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52670"
},
{
"name": "CVE-2023-52675",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52675"
},
{
"name": "CVE-2024-35819",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35819"
},
{
"name": "CVE-2024-35835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35835"
},
{
"name": "CVE-2024-35837",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35837"
},
{
"name": "CVE-2024-35958",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35958"
},
{
"name": "CVE-2024-35960",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35960"
},
{
"name": "CVE-2024-35997",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35997"
},
{
"name": "CVE-2024-36020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36020"
},
{
"name": "CVE-2021-33630",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33630"
},
{
"name": "CVE-2023-52672",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52672"
},
{
"name": "CVE-2024-27414",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27414"
},
{
"name": "CVE-2024-31076",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-31076"
},
{
"name": "CVE-2024-33621",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33621"
},
{
"name": "CVE-2024-35785",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35785"
},
{
"name": "CVE-2024-35805",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35805"
},
{
"name": "CVE-2024-35807",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35807"
},
{
"name": "CVE-2024-35853",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35853"
},
{
"name": "CVE-2024-35855",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35855"
},
{
"name": "CVE-2024-35871",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35871"
},
{
"name": "CVE-2024-35884",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35884"
},
{
"name": "CVE-2024-35886",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35886"
},
{
"name": "CVE-2024-35888",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35888"
},
{
"name": "CVE-2024-35893",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35893"
},
{
"name": "CVE-2024-35896",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35896"
},
{
"name": "CVE-2024-35897",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35897"
},
{
"name": "CVE-2024-35898",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35898"
},
{
"name": "CVE-2024-35899",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35899"
},
{
"name": "CVE-2024-35900",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35900"
},
{
"name": "CVE-2024-35902",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35902"
},
{
"name": "CVE-2024-35910",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35910"
},
{
"name": "CVE-2024-35925",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35925"
},
{
"name": "CVE-2024-35934",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35934"
},
{
"name": "CVE-2024-35962",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35962"
},
{
"name": "CVE-2024-35983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35983"
},
{
"name": "CVE-2024-35988",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35988"
},
{
"name": "CVE-2024-35996",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35996"
},
{
"name": "CVE-2024-36004",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36004"
},
{
"name": "CVE-2024-36005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36005"
},
{
"name": "CVE-2024-36008",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36008"
},
{
"name": "CVE-2024-36286",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36286"
},
{
"name": "CVE-2024-36288",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36288"
},
{
"name": "CVE-2024-36960",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36960"
},
{
"name": "CVE-2024-36964",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36964"
},
{
"name": "CVE-2024-36971",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36971"
},
{
"name": "CVE-2024-37353",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37353"
},
{
"name": "CVE-2024-37356",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37356"
},
{
"name": "CVE-2024-38381",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38381"
},
{
"name": "CVE-2024-38549",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38549"
},
{
"name": "CVE-2024-38552",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38552"
},
{
"name": "CVE-2024-38558",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38558"
},
{
"name": "CVE-2024-38559",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38559"
},
{
"name": "CVE-2024-38560",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38560"
},
{
"name": "CVE-2024-38565",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38565"
},
{
"name": "CVE-2024-38567",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38567"
},
{
"name": "CVE-2024-38578",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38578"
},
{
"name": "CVE-2024-38579",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38579"
},
{
"name": "CVE-2024-38582",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38582"
},
{
"name": "CVE-2024-38583",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38583"
},
{
"name": "CVE-2024-38587",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38587"
},
{
"name": "CVE-2024-38589",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38589"
},
{
"name": "CVE-2024-38596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38596"
},
{
"name": "CVE-2024-38598",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38598"
},
{
"name": "CVE-2024-38599",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38599"
},
{
"name": "CVE-2024-38601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38601"
},
{
"name": "CVE-2024-38612",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38612"
},
{
"name": "CVE-2024-38618",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38618"
},
{
"name": "CVE-2024-38621",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38621"
},
{
"name": "CVE-2024-38627",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38627"
},
{
"name": "CVE-2024-38633",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38633"
},
{
"name": "CVE-2024-38634",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38634"
},
{
"name": "CVE-2024-38637",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38637"
},
{
"name": "CVE-2024-38659",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38659"
},
{
"name": "CVE-2024-38780",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38780"
},
{
"name": "CVE-2024-39292",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39292"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0527",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-06-28T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de Debian LTS. Elles permettent \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et un d\u00e9ni de service.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Debian LTS",
"vendor_advisories": [
{
"published_at": "2024-06-25",
"title": "Bulletin de s\u00e9curit\u00e9 Debian LTS DLA-3840-1",
"url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html"
},
{
"published_at": "2024-06-25",
"title": "Bulletin de s\u00e9curit\u00e9 Debian LTS DLA-3842-1",
"url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html"
},
{
"published_at": "2024-06-25",
"title": "Bulletin de s\u00e9curit\u00e9 Debian LTS DLA-3843-1",
"url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00019.html"
},
{
"published_at": "2024-06-25",
"title": "Bulletin de s\u00e9curit\u00e9 Debian LTS DLA-3841-1",
"url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html"
}
]
}
CERTFR-2024-AVI-0242
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15 SP5 | ||
| SUSE | N/A | Legacy Module 15-SP5 | ||
| SUSE | openSUSE Leap | openSUSE Leap 15.5 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 15-SP5 | ||
| SUSE | SUSE Linux Enterprise Desktop | SUSE Linux Enterprise Desktop 15 SP5 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15 SP4 | ||
| SUSE | SUSE Manager Retail Branch Server | SUSE Manager Retail Branch Server 4.3 | ||
| SUSE | openSUSE Leap | openSUSE Leap 15.4 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability Extension 15 SP4 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability Extension 15 SP5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP5 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro for Rancher 5.4 | ||
| SUSE | SUSE Real Time Module | SUSE Real Time Module 15-SP5 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 | ||
| SUSE | Basesystem Module | Basesystem Module 15-SP5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15 SP5 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.3 | ||
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time 15 SP5 | ||
| SUSE | openSUSE Leap | openSUSE Leap Micro 5.3 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro for Rancher 5.3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 | ||
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time 15 SP4 | ||
| SUSE | SUSE Manager Proxy | SUSE Manager Proxy 4.3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15 SP4 | ||
| SUSE | SUSE Linux Enterprise Desktop | SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.5 | ||
| SUSE | openSUSE Leap | openSUSE Leap Micro 5.4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 15 SP5 | ||
| SUSE | N/A | Development Tools Module 15-SP5 | ||
| SUSE | SUSE Manager Server | SUSE Manager Server 4.3 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.4 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 15-SP4 |
| Title | Publication Time | Tags | |||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise High Performance Computing 15 SP5",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Legacy Module 15-SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.5",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Desktop 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Desktop",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15 SP4",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Retail Branch Server 4.3",
"product": {
"name": "SUSE Manager Retail Branch Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.4",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability Extension 15 SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing LTSS 15 SP4",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability Extension 15 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro for Rancher 5.4",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Real Time Module 15-SP5",
"product": {
"name": "SUSE Real Time Module",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Basesystem Module 15-SP5",
"product": {
"name": "Basesystem Module",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.3",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Real Time",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap Micro 5.3",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro for Rancher 5.3",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Real Time",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Proxy 4.3",
"product": {
"name": "SUSE Manager Proxy",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4",
"product": {
"name": "SUSE Linux Enterprise Desktop",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.5",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap Micro 5.4",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 15 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Development Tools Module 15-SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Server 4.3",
"product": {
"name": "SUSE Manager Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.4",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-35827",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35827"
},
{
"name": "CVE-2023-52448",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52448"
},
{
"name": "CVE-2023-52456",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52456"
},
{
"name": "CVE-2024-26595",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26595"
},
{
"name": "CVE-2021-47076",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47076"
},
{
"name": "CVE-2023-52532",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52532"
},
{
"name": "CVE-2020-36777",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36777"
},
{
"name": "CVE-2021-47078",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47078"
},
{
"name": "CVE-2024-26586",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26586"
},
{
"name": "CVE-2024-26585",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26585"
},
{
"name": "CVE-2024-25744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25744"
},
{
"name": "CVE-2023-52429",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52429"
},
{
"name": "CVE-2023-52559",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52559"
},
{
"name": "CVE-2021-46953",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46953"
},
{
"name": "CVE-2024-26603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26603"
},
{
"name": "CVE-2023-28746",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28746"
},
{
"name": "CVE-2021-46904",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46904"
},
{
"name": "CVE-2024-26589",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26589"
},
{
"name": "CVE-2019-25162",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25162"
},
{
"name": "CVE-2023-52478",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52478"
},
{
"name": "CVE-2023-46343",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46343"
},
{
"name": "CVE-2021-46968",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46968"
},
{
"name": "CVE-2021-46929",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46929"
},
{
"name": "CVE-2021-46905",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46905"
},
{
"name": "CVE-2021-47061",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47061"
},
{
"name": "CVE-2021-46924",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46924"
},
{
"name": "CVE-2021-46906",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46906"
},
{
"name": "CVE-2021-47012",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47012"
},
{
"name": "CVE-2023-52340",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52340"
},
{
"name": "CVE-2023-6817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6817"
},
{
"name": "CVE-2023-52605",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52605"
},
{
"name": "CVE-2021-46964",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46964"
},
{
"name": "CVE-2024-26598",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26598"
},
{
"name": "CVE-2023-52482",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52482"
},
{
"name": "CVE-2022-20154",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20154"
},
{
"name": "CVE-2021-47013",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47013"
},
{
"name": "CVE-2021-46966",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46966"
},
{
"name": "CVE-2023-52475",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52475"
},
{
"name": "CVE-2024-26593",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26593"
},
{
"name": "CVE-2023-6270",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6270"
},
{
"name": "CVE-2022-48627",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48627"
},
{
"name": "CVE-2021-46915",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46915"
},
{
"name": "CVE-2023-52462",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52462"
},
{
"name": "CVE-2021-46989",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46989"
},
{
"name": "CVE-2021-47054",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47054"
},
{
"name": "CVE-2023-52484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52484"
},
{
"name": "CVE-2023-52569",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52569"
},
{
"name": "CVE-2023-52451",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52451"
},
{
"name": "CVE-2024-0607",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0607"
},
{
"name": "CVE-2024-26607",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26607"
},
{
"name": "CVE-2023-52439",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52439"
},
{
"name": "CVE-2023-52574",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52574"
},
{
"name": "CVE-2023-52445",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52445"
},
{
"name": "CVE-2024-23850",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23850"
},
{
"name": "CVE-2021-47083",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47083"
},
{
"name": "CVE-2021-47060",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47060"
},
{
"name": "CVE-2021-46974",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46974"
},
{
"name": "CVE-2024-1151",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1151"
},
{
"name": "CVE-2024-23851",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23851"
},
{
"name": "CVE-2021-46923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46923"
},
{
"name": "CVE-2024-26602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26602"
},
{
"name": "CVE-2021-46934",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46934"
},
{
"name": "CVE-2021-46932",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46932"
},
{
"name": "CVE-2024-26591",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26591"
},
{
"name": "CVE-2023-52447",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52447"
},
{
"name": "CVE-2023-52464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52464"
},
{
"name": "CVE-2021-47069",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47069"
},
{
"name": "CVE-2023-52502",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52502"
},
{
"name": "CVE-2023-52597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52597"
},
{
"name": "CVE-2023-5197",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5197"
},
{
"name": "CVE-2023-52531",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52531"
},
{
"name": "CVE-2023-51042",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51042"
},
{
"name": "CVE-2023-52463",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52463"
},
{
"name": "CVE-2023-52467",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52467"
},
{
"name": "CVE-2024-0340",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0340"
},
{
"name": "CVE-2023-52443",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52443"
},
{
"name": "CVE-2023-52530",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52530"
},
{
"name": "CVE-2021-47005",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47005"
},
{
"name": "CVE-2020-36784",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36784"
},
{
"name": "CVE-2023-52452",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52452"
},
{
"name": "CVE-2024-23849",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23849"
},
{
"name": "CVE-2022-48628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48628"
},
{
"name": "CVE-2024-26622",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26622"
},
{
"name": "CVE-2023-52457",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52457"
},
{
"name": "CVE-2023-52449",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52449"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0242",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-03-22T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003ele noyau Linux de SUSE\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non\nsp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de code arbitraire et un d\u00e9ni de\nservice \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:0900-1 du 14 mars 2024",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20240900-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:0857-1 du 13 mars 2024",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20240857-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:0855-1 du 12 mars 2024",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20240855-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:0858-1 du 13 mars 2024",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20240858-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:0900-2 du 15 mars 2024",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20240900-2"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:0910-1 du 15 mars 2024",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20240910-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:0856-1 du 13 mars 2024",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20240856-1"
}
]
}
CERTFR-2025-AVI-1057
Vulnerability from certfr_avis - Published: 2025-12-02 - Updated: 2025-12-02
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 16.x antérieures à 16.11.0 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 14.x antérieures à 14.20.0 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 17.x antérieures à 17.7.0 | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Hub versions antérieures à 10.3.1 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 18.x antérieures à 18.1.0 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 15.x antérieures à 15.15.0 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 13.x antérieures à 13.23.0 |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Tanzu pour Postgres versions 16.x ant\u00e9rieures \u00e0 16.11.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions 14.x ant\u00e9rieures \u00e0 14.20.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions 17.x ant\u00e9rieures \u00e0 17.7.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Hub versions ant\u00e9rieures \u00e0 10.3.1",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions 18.x ant\u00e9rieures \u00e0 18.1.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions 15.x ant\u00e9rieures \u00e0 15.15.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions 13.x ant\u00e9rieures \u00e0 13.23.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2019-12900",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12900"
},
{
"name": "CVE-2019-25013",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25013"
},
{
"name": "CVE-2020-28196",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28196"
},
{
"name": "CVE-2020-10029",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10029"
},
{
"name": "CVE-2019-18276",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18276"
},
{
"name": "CVE-2021-3421",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3421"
},
{
"name": "CVE-2021-3326",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3326"
},
{
"name": "CVE-2020-27618",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27618"
},
{
"name": "CVE-2021-20227",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20227"
},
{
"name": "CVE-2021-36222",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36222"
},
{
"name": "CVE-2022-23960",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23960"
},
{
"name": "CVE-2022-37967",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37967"
},
{
"name": "CVE-2022-3629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3629"
},
{
"name": "CVE-2022-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
},
{
"name": "CVE-2022-37434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37434"
},
{
"name": "CVE-2022-2309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2309"
},
{
"name": "CVE-2022-43680",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43680"
},
{
"name": "CVE-2022-29824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29824"
},
{
"name": "CVE-2022-23308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23308"
},
{
"name": "CVE-2022-35737",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35737"
},
{
"name": "CVE-2022-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40303"
},
{
"name": "CVE-2022-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40304"
},
{
"name": "CVE-2022-42898",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42898"
},
{
"name": "CVE-2022-3633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3633"
},
{
"name": "CVE-2022-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
},
{
"name": "CVE-2022-32205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32205"
},
{
"name": "CVE-2022-32206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32206"
},
{
"name": "CVE-2018-25032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
},
{
"name": "CVE-2022-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3996"
},
{
"name": "CVE-2022-3903",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3903"
},
{
"name": "CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"name": "CVE-2022-26878",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26878"
},
{
"name": "CVE-2021-20266",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20266"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2022-1974",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1974"
},
{
"name": "CVE-2021-3521",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3521"
},
{
"name": "CVE-2022-27774",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27774"
},
{
"name": "CVE-2022-27775",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27775"
},
{
"name": "CVE-2022-22576",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22576"
},
{
"name": "CVE-2022-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27776"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2022-2097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2097"
},
{
"name": "CVE-2022-20154",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20154"
},
{
"name": "CVE-2017-7500",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7500"
},
{
"name": "CVE-2021-33574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33574"
},
{
"name": "CVE-2021-36690",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36690"
},
{
"name": "CVE-2021-37750",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37750"
},
{
"name": "CVE-2021-3999",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3999"
},
{
"name": "CVE-2022-23218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23218"
},
{
"name": "CVE-2022-23219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23219"
},
{
"name": "CVE-2022-27782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
},
{
"name": "CVE-2022-32208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32208"
},
{
"name": "CVE-2022-27781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27781"
},
{
"name": "CVE-2022-32207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32207"
},
{
"name": "CVE-2022-3358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3358"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2022-29458",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29458"
},
{
"name": "CVE-2021-39537",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39537"
},
{
"name": "CVE-2022-32221",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32221"
},
{
"name": "CVE-2022-42916",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42916"
},
{
"name": "CVE-2022-35252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35252"
},
{
"name": "CVE-2022-42915",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42915"
},
{
"name": "CVE-2022-43551",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43551"
},
{
"name": "CVE-2022-43552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43552"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2022-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4203"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2022-27672",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27672"
},
{
"name": "CVE-2023-0045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0045"
},
{
"name": "CVE-2023-23915",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23915"
},
{
"name": "CVE-2023-23914",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23914"
},
{
"name": "CVE-2023-23916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23916"
},
{
"name": "CVE-2022-1304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1304"
},
{
"name": "CVE-2023-24329",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24329"
},
{
"name": "CVE-2023-1118",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1118"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2023-1838",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1838"
},
{
"name": "CVE-2023-28410",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28410"
},
{
"name": "CVE-2023-29469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29469"
},
{
"name": "CVE-2023-28484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28484"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2023-27535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27535"
},
{
"name": "CVE-2022-27779",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27779"
},
{
"name": "CVE-2023-27533",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27533"
},
{
"name": "CVE-2023-27538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27538"
},
{
"name": "CVE-2023-27534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27534"
},
{
"name": "CVE-2023-27536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27536"
},
{
"name": "CVE-2022-27780",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27780"
},
{
"name": "CVE-2022-30115",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30115"
},
{
"name": "CVE-2023-1380",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1380"
},
{
"name": "CVE-2020-1752",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1752"
},
{
"name": "CVE-2021-35942",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35942"
},
{
"name": "CVE-2021-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38604"
},
{
"name": "CVE-2020-29562",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29562"
},
{
"name": "CVE-2021-27645",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27645"
},
{
"name": "CVE-2022-3534",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3534"
},
{
"name": "CVE-2023-2156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2156"
},
{
"name": "CVE-2023-3006",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3006"
},
{
"name": "CVE-2023-1255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1255"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2022-46908",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46908"
},
{
"name": "CVE-2021-31239",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31239"
},
{
"name": "CVE-2023-28320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28320"
},
{
"name": "CVE-2023-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28321"
},
{
"name": "CVE-2023-2975",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2975"
},
{
"name": "CVE-2022-4899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4899"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2023-28319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28319"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2023-4387",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4387"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2023-38545",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38545"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2023-45853",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45853"
},
{
"name": "CVE-2023-31085",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31085"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2023-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40217"
},
{
"name": "CVE-2020-22218",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22218"
},
{
"name": "CVE-2023-2603",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2603"
},
{
"name": "CVE-2023-2602",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2602"
},
{
"name": "CVE-2023-4813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4813"
},
{
"name": "CVE-2022-0563",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0563"
},
{
"name": "CVE-2023-4039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4039"
},
{
"name": "CVE-2023-5156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5156"
},
{
"name": "CVE-2023-29491",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29491"
},
{
"name": "CVE-2023-39615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39615"
},
{
"name": "CVE-2021-37600",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37600"
},
{
"name": "CVE-2021-33294",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33294"
},
{
"name": "CVE-2021-43618",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43618"
},
{
"name": "CVE-2023-45322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45322"
},
{
"name": "CVE-2019-17498",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17498"
},
{
"name": "CVE-2013-4235",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4235"
},
{
"name": "CVE-2023-29383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2023-36054",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36054"
},
{
"name": "CVE-2023-7104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7104"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2023-52467",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52467"
},
{
"name": "CVE-2023-52451",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52451"
},
{
"name": "CVE-2023-52445",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52445"
},
{
"name": "CVE-2024-26598",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26598"
},
{
"name": "CVE-2023-52462",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52462"
},
{
"name": "CVE-2023-52469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52469"
},
{
"name": "CVE-2023-52470",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52470"
},
{
"name": "CVE-2023-52464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52464"
},
{
"name": "CVE-2023-52475",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52475"
},
{
"name": "CVE-2023-52478",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52478"
},
{
"name": "CVE-2024-26603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26603"
},
{
"name": "CVE-2023-52452",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52452"
},
{
"name": "CVE-2023-52532",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52532"
},
{
"name": "CVE-2019-25162",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25162"
},
{
"name": "CVE-2021-46904",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46904"
},
{
"name": "CVE-2024-24855",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24855"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2023-36632",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36632"
},
{
"name": "CVE-2024-28085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28085"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2020-22916",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22916"
},
{
"name": "CVE-2024-26631",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26631"
},
{
"name": "CVE-2017-7501",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7501"
},
{
"name": "CVE-2021-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35939"
},
{
"name": "CVE-2021-35938",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35938"
},
{
"name": "CVE-2021-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35937"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2023-52426",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52426"
},
{
"name": "CVE-2023-52501",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52501"
},
{
"name": "CVE-2023-52519",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52519"
},
{
"name": "CVE-2024-26717",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26717"
},
{
"name": "CVE-2024-26670",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26670"
},
{
"name": "CVE-2023-52477",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52477"
},
{
"name": "CVE-2023-52528",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52528"
},
{
"name": "CVE-2023-52582",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52582"
},
{
"name": "CVE-2021-47098",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47098"
},
{
"name": "CVE-2023-52513",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52513"
},
{
"name": "CVE-2024-22099",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22099"
},
{
"name": "CVE-2021-47097",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47097"
},
{
"name": "CVE-2023-52520",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52520"
},
{
"name": "CVE-2023-7042",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7042"
},
{
"name": "CVE-2023-52523",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52523"
},
{
"name": "CVE-2024-26803",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26803"
},
{
"name": "CVE-2024-24858",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24858"
},
{
"name": "CVE-2024-24857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24857"
},
{
"name": "CVE-2024-26660",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26660"
},
{
"name": "CVE-2024-26760",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26760"
},
{
"name": "CVE-2024-26681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26681"
},
{
"name": "CVE-2024-26815",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26815"
},
{
"name": "CVE-2024-26621",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26621"
},
{
"name": "CVE-2024-26714",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26714"
},
{
"name": "CVE-2024-26761",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26761"
},
{
"name": "CVE-2024-26742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26742"
},
{
"name": "CVE-2021-47020",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47020"
},
{
"name": "CVE-2021-47017",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47017"
},
{
"name": "CVE-2021-46984",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46984"
},
{
"name": "CVE-2021-47071",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47071"
},
{
"name": "CVE-2021-47202",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47202"
},
{
"name": "CVE-2024-26605",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26605"
},
{
"name": "CVE-2024-26989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26989"
},
{
"name": "CVE-2024-27003",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27003"
},
{
"name": "CVE-2024-26987",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26987"
},
{
"name": "CVE-2024-27015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27015"
},
{
"name": "CVE-2024-27014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27014"
},
{
"name": "CVE-2024-26992",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26992"
},
{
"name": "CVE-2023-52468",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52468"
},
{
"name": "CVE-2023-52487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52487"
},
{
"name": "CVE-2024-26618",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26618"
},
{
"name": "CVE-2023-52490",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52490"
},
{
"name": "CVE-2023-52455",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52455"
},
{
"name": "CVE-2023-52472",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52472"
},
{
"name": "CVE-2023-52643",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52643"
},
{
"name": "CVE-2024-26649",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26649"
},
{
"name": "CVE-2023-52473",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52473"
},
{
"name": "CVE-2023-52465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52465"
},
{
"name": "CVE-2007-4559",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4559"
},
{
"name": "CVE-2023-52425",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52425"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2024-27042",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27042"
},
{
"name": "CVE-2021-47197",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47197"
},
{
"name": "CVE-2021-47196",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47196"
},
{
"name": "CVE-2022-48702",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48702"
},
{
"name": "CVE-2022-48701",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48701"
},
{
"name": "CVE-2022-48694",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48694"
},
{
"name": "CVE-2022-48644",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48644"
},
{
"name": "CVE-2021-47217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47217"
},
{
"name": "CVE-2022-48653",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48653"
},
{
"name": "CVE-2021-47214",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47214"
},
{
"name": "CVE-2022-48672",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48672"
},
{
"name": "CVE-2022-48657",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48657"
},
{
"name": "CVE-2022-48652",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48652"
},
{
"name": "CVE-2022-48658",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48658"
},
{
"name": "CVE-2021-47210",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47210"
},
{
"name": "CVE-2022-48662",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48662"
},
{
"name": "CVE-2022-48639",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48639"
},
{
"name": "CVE-2023-52646",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52646"
},
{
"name": "CVE-2022-48640",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48640"
},
{
"name": "CVE-2024-26933",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26933"
},
{
"name": "CVE-2021-47215",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47215"
},
{
"name": "CVE-2021-47074",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47074"
},
{
"name": "CVE-2021-47041",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47041"
},
{
"name": "CVE-2024-27039",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27039"
},
{
"name": "CVE-2022-48704",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48704"
},
{
"name": "CVE-2022-48675",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48675"
},
{
"name": "CVE-2022-48690",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48690"
},
{
"name": "CVE-2021-47191",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47191"
},
{
"name": "CVE-2022-48637",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48637"
},
{
"name": "CVE-2022-48632",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48632"
},
{
"name": "CVE-2022-48660",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48660"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2025-9231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9231"
},
{
"name": "CVE-2023-52565",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52565"
},
{
"name": "CVE-2024-26892",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26892"
},
{
"name": "CVE-2024-26964",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26964"
},
{
"name": "CVE-2025-9230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9230"
},
{
"name": "CVE-2025-9232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9232"
},
{
"name": "CVE-2021-47227",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47227"
},
{
"name": "CVE-2021-47237",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47237"
},
{
"name": "CVE-2021-47239",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47239"
},
{
"name": "CVE-2021-47250",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47250"
},
{
"name": "CVE-2021-47261",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47261"
},
{
"name": "CVE-2021-47343",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47343"
},
{
"name": "CVE-2021-47360",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47360"
},
{
"name": "CVE-2021-47365",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47365"
},
{
"name": "CVE-2021-47373",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47373"
},
{
"name": "CVE-2021-47393",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47393"
},
{
"name": "CVE-2021-47398",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47398"
},
{
"name": "CVE-2021-47404",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47404"
},
{
"name": "CVE-2021-47420",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47420"
},
{
"name": "CVE-2021-47422",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47422"
},
{
"name": "CVE-2021-47426",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47426"
},
{
"name": "CVE-2021-47428",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47428"
},
{
"name": "CVE-2021-47429",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47429"
},
{
"name": "CVE-2021-47430",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47430"
},
{
"name": "CVE-2021-47438",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47438"
},
{
"name": "CVE-2021-47444",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47444"
},
{
"name": "CVE-2021-47454",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47454"
},
{
"name": "CVE-2021-47457",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47457"
},
{
"name": "CVE-2021-47465",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47465"
},
{
"name": "CVE-2021-47481",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47481"
},
{
"name": "CVE-2021-47483",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47483"
},
{
"name": "CVE-2021-47490",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47490"
},
{
"name": "CVE-2021-47495",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47495"
},
{
"name": "CVE-2021-47497",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47497"
},
{
"name": "CVE-2021-47499",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47499"
},
{
"name": "CVE-2021-47500",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47500"
},
{
"name": "CVE-2021-47505",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47505"
},
{
"name": "CVE-2021-47516",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47516"
},
{
"name": "CVE-2021-47527",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47527"
},
{
"name": "CVE-2021-47536",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47536"
},
{
"name": "CVE-2021-47537",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47537"
},
{
"name": "CVE-2021-47538",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47538"
},
{
"name": "CVE-2021-47550",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47550"
},
{
"name": "CVE-2021-47559",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47559"
},
{
"name": "CVE-2022-48689",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48689"
},
{
"name": "CVE-2022-48691",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48691"
},
{
"name": "CVE-2022-48705",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48705"
},
{
"name": "CVE-2022-48709",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48709"
},
{
"name": "CVE-2022-48710",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48710"
},
{
"name": "CVE-2023-52654",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52654"
},
{
"name": "CVE-2023-52659",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52659"
},
{
"name": "CVE-2023-52661",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52661"
},
{
"name": "CVE-2023-52662",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52662"
},
{
"name": "CVE-2023-52679",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52679"
},
{
"name": "CVE-2023-52686",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52686"
},
{
"name": "CVE-2023-52690",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52690"
},
{
"name": "CVE-2023-52698",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52698"
},
{
"name": "CVE-2023-52702",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52702"
},
{
"name": "CVE-2023-52703",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52703"
},
{
"name": "CVE-2023-52730",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52730"
},
{
"name": "CVE-2023-52731",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52731"
},
{
"name": "CVE-2023-52736",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52736"
},
{
"name": "CVE-2023-52739",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52739"
},
{
"name": "CVE-2023-52740",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52740"
},
{
"name": "CVE-2023-52743",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52743"
},
{
"name": "CVE-2023-52744",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52744"
},
{
"name": "CVE-2023-52747",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52747"
},
{
"name": "CVE-2023-52764",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52764"
},
{
"name": "CVE-2023-52781",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52781"
},
{
"name": "CVE-2023-52788",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52788"
},
{
"name": "CVE-2023-52791",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52791"
},
{
"name": "CVE-2023-52795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52795"
},
{
"name": "CVE-2023-52796",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52796"
},
{
"name": "CVE-2023-52803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52803"
},
{
"name": "CVE-2023-52806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52806"
},
{
"name": "CVE-2023-52814",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52814"
},
{
"name": "CVE-2023-52817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52817"
},
{
"name": "CVE-2023-52818",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52818"
},
{
"name": "CVE-2023-52833",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52833"
},
{
"name": "CVE-2023-52840",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52840"
},
{
"name": "CVE-2023-52851",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52851"
},
{
"name": "CVE-2023-52854",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52854"
},
{
"name": "CVE-2023-52867",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52867"
},
{
"name": "CVE-2023-52877",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52877"
},
{
"name": "CVE-2024-26838",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26838"
},
{
"name": "CVE-2024-35801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35801"
},
{
"name": "CVE-2024-35804",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35804"
},
{
"name": "CVE-2024-35860",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35860"
},
{
"name": "CVE-2024-35872",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35872"
},
{
"name": "CVE-2024-35901",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35901"
},
{
"name": "CVE-2024-35912",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35912"
},
{
"name": "CVE-2024-35952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35952"
},
{
"name": "CVE-2024-35959",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35959"
},
{
"name": "CVE-2024-35963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35963"
},
{
"name": "CVE-2024-35964",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35964"
},
{
"name": "CVE-2024-36012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36012"
},
{
"name": "CVE-2024-36906",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36906"
},
{
"name": "CVE-2024-36918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36918"
},
{
"name": "CVE-2024-36926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36926"
},
{
"name": "CVE-2024-28757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28757"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2023-52663",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52663"
},
{
"name": "CVE-2023-52675",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52675"
},
{
"name": "CVE-2023-52697",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52697"
},
{
"name": "CVE-2024-26611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26611"
},
{
"name": "CVE-2024-26674",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26674"
},
{
"name": "CVE-2024-26899",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26899"
},
{
"name": "CVE-2024-26990",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26990"
},
{
"name": "CVE-2024-27027",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27027"
},
{
"name": "CVE-2024-27031",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27031"
},
{
"name": "CVE-2024-27057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27057"
},
{
"name": "CVE-2024-35795",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35795"
},
{
"name": "CVE-2024-35810",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35810"
},
{
"name": "CVE-2024-35814",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35814"
},
{
"name": "CVE-2024-35824",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35824"
},
{
"name": "CVE-2024-35834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35834"
},
{
"name": "CVE-2024-35836",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35836"
},
{
"name": "CVE-2024-35838",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35838"
},
{
"name": "CVE-2024-35891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35891"
},
{
"name": "CVE-2024-35903",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35903"
},
{
"name": "CVE-2024-35917",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35917"
},
{
"name": "CVE-2024-35927",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35927"
},
{
"name": "CVE-2024-35974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35974"
},
{
"name": "CVE-2024-35981",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35981"
},
{
"name": "CVE-2024-35991",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35991"
},
{
"name": "CVE-2024-36002",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36002"
},
{
"name": "CVE-2024-36011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36011"
},
{
"name": "CVE-2024-36021",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36021"
},
{
"name": "CVE-2024-36891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36891"
},
{
"name": "CVE-2024-36930",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36930"
},
{
"name": "CVE-2024-36936",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36936"
},
{
"name": "CVE-2024-35983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35983"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2024-0397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0397"
},
{
"name": "CVE-2024-4030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4030"
},
{
"name": "CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"name": "CVE-2023-52648",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52648"
},
{
"name": "CVE-2023-52649",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52649"
},
{
"name": "CVE-2024-26953",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26953"
},
{
"name": "CVE-2024-26975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26975"
},
{
"name": "CVE-2024-27026",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27026"
},
{
"name": "CVE-2024-27079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27079"
},
{
"name": "CVE-2024-27390",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27390"
},
{
"name": "CVE-2024-35787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35787"
},
{
"name": "CVE-2024-35827",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35827"
},
{
"name": "CVE-2024-35831",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35831"
},
{
"name": "CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"name": "CVE-2023-52560",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52560"
},
{
"name": "CVE-2023-52813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52813"
},
{
"name": "CVE-2023-52835",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52835"
},
{
"name": "CVE-2023-52881",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52881"
},
{
"name": "CVE-2024-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
},
{
"name": "CVE-2024-25062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25062"
},
{
"name": "CVE-2024-26458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26458"
},
{
"name": "CVE-2024-26461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26461"
},
{
"name": "CVE-2021-47539",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47539"
},
{
"name": "CVE-2021-47572",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47572"
},
{
"name": "CVE-2021-47576",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47576"
},
{
"name": "CVE-2021-47578",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47578"
},
{
"name": "CVE-2021-47601",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47601"
},
{
"name": "CVE-2021-47607",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47607"
},
{
"name": "CVE-2021-47609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47609"
},
{
"name": "CVE-2021-47616",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47616"
},
{
"name": "CVE-2021-47617",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47617"
},
{
"name": "CVE-2021-47620",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47620"
},
{
"name": "CVE-2022-48712",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48712"
},
{
"name": "CVE-2022-48713",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48713"
},
{
"name": "CVE-2022-48714",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48714"
},
{
"name": "CVE-2022-48720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48720"
},
{
"name": "CVE-2022-48724",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48724"
},
{
"name": "CVE-2022-48725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48725"
},
{
"name": "CVE-2022-48727",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48727"
},
{
"name": "CVE-2022-48728",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48728"
},
{
"name": "CVE-2022-48729",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48729"
},
{
"name": "CVE-2022-48732",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48732"
},
{
"name": "CVE-2022-48745",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48745"
},
{
"name": "CVE-2022-48746",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48746"
},
{
"name": "CVE-2022-48752",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48752"
},
{
"name": "CVE-2022-48760",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48760"
},
{
"name": "CVE-2022-48763",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48763"
},
{
"name": "CVE-2022-48767",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48767"
},
{
"name": "CVE-2022-48768",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48768"
},
{
"name": "CVE-2022-48769",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48769"
},
{
"name": "CVE-2022-48770",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48770"
},
{
"name": "CVE-2023-52787",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52787"
},
{
"name": "CVE-2023-52837",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52837"
},
{
"name": "CVE-2023-52845",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52845"
},
{
"name": "CVE-2023-52846",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52846"
},
{
"name": "CVE-2024-35979",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35979"
},
{
"name": "CVE-2024-36477",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36477"
},
{
"name": "CVE-2024-36937",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36937"
},
{
"name": "CVE-2024-36945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36945"
},
{
"name": "CVE-2024-36967",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36967"
},
{
"name": "CVE-2024-36975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36975"
},
{
"name": "CVE-2023-4641",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4641"
},
{
"name": "CVE-2023-50495",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50495"
},
{
"name": "CVE-2024-24859",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24859"
},
{
"name": "CVE-2024-26734",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26734"
},
{
"name": "CVE-2024-26818",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26818"
},
{
"name": "CVE-2024-26831",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26831"
},
{
"name": "CVE-2024-27012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27012"
},
{
"name": "CVE-2024-27017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27017"
},
{
"name": "CVE-2024-35880",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35880"
},
{
"name": "CVE-2024-35892",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35892"
},
{
"name": "CVE-2024-35894",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35894"
},
{
"name": "CVE-2024-35908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35908"
},
{
"name": "CVE-2024-35913",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35913"
},
{
"name": "CVE-2024-35942",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35942"
},
{
"name": "CVE-2024-35957",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35957"
},
{
"name": "CVE-2024-35980",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35980"
},
{
"name": "CVE-2024-39298",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39298"
},
{
"name": "CVE-2024-39493",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39493"
},
{
"name": "CVE-2024-39500",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39500"
},
{
"name": "CVE-2024-40900",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40900"
},
{
"name": "CVE-2024-40903",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40903"
},
{
"name": "CVE-2024-40908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40908"
},
{
"name": "CVE-2024-40913",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40913"
},
{
"name": "CVE-2024-40919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40919"
},
{
"name": "CVE-2024-40924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40924"
},
{
"name": "CVE-2024-40937",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40937"
},
{
"name": "CVE-2024-40940",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40940"
},
{
"name": "CVE-2024-40948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40948"
},
{
"name": "CVE-2024-40956",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40956"
},
{
"name": "CVE-2024-40989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40989"
},
{
"name": "CVE-2024-40994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40994"
},
{
"name": "CVE-2023-52750",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52750"
},
{
"name": "CVE-2023-52782",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52782"
},
{
"name": "CVE-2023-52786",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52786"
},
{
"name": "CVE-2023-52792",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52792"
},
{
"name": "CVE-2023-52794",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52794"
},
{
"name": "CVE-2023-52842",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52842"
},
{
"name": "CVE-2023-52849",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52849"
},
{
"name": "CVE-2023-52866",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52866"
},
{
"name": "CVE-2024-36010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36010"
},
{
"name": "CVE-2024-36882",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36882"
},
{
"name": "CVE-2024-36962",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36962"
},
{
"name": "CVE-2024-36977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36977"
},
{
"name": "CVE-2024-38566",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38566"
},
{
"name": "CVE-2024-38629",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38629"
},
{
"name": "CVE-2024-39291",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39291"
},
{
"name": "CVE-2024-6923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
},
{
"name": "CVE-2024-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3219"
},
{
"name": "CVE-2024-36028",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36028"
},
{
"name": "CVE-2024-36884",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36884"
},
{
"name": "CVE-2024-36920",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36920"
},
{
"name": "CVE-2024-36932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36932"
},
{
"name": "CVE-2024-36956",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36956"
},
{
"name": "CVE-2024-36961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36961"
},
{
"name": "CVE-2024-38561",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38561"
},
{
"name": "CVE-2024-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38604"
},
{
"name": "CVE-2024-38606",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38606"
},
{
"name": "CVE-2021-47579",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47579"
},
{
"name": "CVE-2022-48757",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48757"
},
{
"name": "CVE-2023-52775",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52775"
},
{
"name": "CVE-2023-52885",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52885"
},
{
"name": "CVE-2024-26837",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26837"
},
{
"name": "CVE-2024-27404",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27404"
},
{
"name": "CVE-2024-39479",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39479"
},
{
"name": "CVE-2024-39498",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39498"
},
{
"name": "CVE-2024-40923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40923"
},
{
"name": "CVE-2024-40925",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40925"
},
{
"name": "CVE-2024-6197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6197"
},
{
"name": "CVE-2021-47623",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47623"
},
{
"name": "CVE-2022-48773",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48773"
},
{
"name": "CVE-2022-48778",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48778"
},
{
"name": "CVE-2022-48780",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48780"
},
{
"name": "CVE-2022-48783",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48783"
},
{
"name": "CVE-2022-48784",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48784"
},
{
"name": "CVE-2022-48785",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48785"
},
{
"name": "CVE-2022-48786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48786"
},
{
"name": "CVE-2022-48787",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48787"
},
{
"name": "CVE-2022-48793",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48793"
},
{
"name": "CVE-2022-48796",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48796"
},
{
"name": "CVE-2022-48797",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48797"
},
{
"name": "CVE-2022-48799",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48799"
},
{
"name": "CVE-2022-48800",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48800"
},
{
"name": "CVE-2022-48801",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48801"
},
{
"name": "CVE-2022-48802",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48802"
},
{
"name": "CVE-2022-48804",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48804"
},
{
"name": "CVE-2022-48806",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48806"
},
{
"name": "CVE-2022-48809",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48809"
},
{
"name": "CVE-2022-48810",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48810"
},
{
"name": "CVE-2022-48812",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48812"
},
{
"name": "CVE-2025-58056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58056"
},
{
"name": "CVE-2025-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58057"
},
{
"name": "CVE-2025-10966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10966"
},
{
"name": "CVE-2025-59425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59425"
},
{
"name": "CVE-2022-48813",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48813"
},
{
"name": "CVE-2022-48815",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48815"
},
{
"name": "CVE-2022-48817",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48817"
},
{
"name": "CVE-2022-48818",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48818"
},
{
"name": "CVE-2022-48823",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48823"
},
{
"name": "CVE-2022-48825",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48825"
},
{
"name": "CVE-2022-48830",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48830"
},
{
"name": "CVE-2022-48831",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48831"
},
{
"name": "CVE-2022-48834",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48834"
},
{
"name": "CVE-2022-48835",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48835"
},
{
"name": "CVE-2022-48836",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48836"
},
{
"name": "CVE-2022-48837",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48837"
},
{
"name": "CVE-2022-48839",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48839"
},
{
"name": "CVE-2022-48840",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48840"
},
{
"name": "CVE-2022-48843",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48843"
},
{
"name": "CVE-2022-48850",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48850"
},
{
"name": "CVE-2022-48853",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48853"
},
{
"name": "CVE-2022-48858",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48858"
},
{
"name": "CVE-2022-48861",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48861"
},
{
"name": "CVE-2022-48863",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48863"
},
{
"name": "CVE-2022-48864",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48864"
},
{
"name": "CVE-2022-48866",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48866"
},
{
"name": "CVE-2023-52886",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52886"
},
{
"name": "CVE-2024-41057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41057"
},
{
"name": "CVE-2024-41058",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41058"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2025-12817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12817"
},
{
"name": "CVE-2025-12818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12818"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2019-14844",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14844"
},
{
"name": "CVE-2021-24031",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-24031"
},
{
"name": "CVE-2021-24032",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-24032"
},
{
"name": "CVE-2021-44964",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44964"
},
{
"name": "CVE-2022-28805",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28805"
},
{
"name": "CVE-2022-33099",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33099"
},
{
"name": "CVE-2025-0306",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0306"
},
{
"name": "CVE-2025-52099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52099"
},
{
"name": "CVE-2025-53643",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53643"
},
{
"name": "CVE-2025-59375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59375"
},
{
"name": "CVE-2025-6141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6141"
},
{
"name": "CVE-2025-7709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7709"
},
{
"name": "CVE-2025-9714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9714"
},
{
"name": "CVE-2024-45491",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45491"
},
{
"name": "CVE-2024-45492",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45492"
},
{
"name": "CVE-2024-38632",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38632"
},
{
"name": "CVE-2024-39491",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39491"
},
{
"name": "CVE-2024-40922",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40922"
},
{
"name": "CVE-2024-40930",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40930"
},
{
"name": "CVE-2024-40964",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40964"
},
{
"name": "CVE-2024-40992",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40992"
},
{
"name": "CVE-2024-41003",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41003"
},
{
"name": "CVE-2024-41047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41047"
},
{
"name": "CVE-2024-42085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42085"
},
{
"name": "CVE-2024-42109",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42109"
},
{
"name": "CVE-2024-42240",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42240"
},
{
"name": "CVE-2021-47517",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47517"
},
{
"name": "CVE-2022-48865",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48865"
},
{
"name": "CVE-2022-48875",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48875"
},
{
"name": "CVE-2022-48883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48883"
},
{
"name": "CVE-2022-48886",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48886"
},
{
"name": "CVE-2022-48889",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48889"
},
{
"name": "CVE-2022-48890",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48890"
},
{
"name": "CVE-2022-48896",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48896"
},
{
"name": "CVE-2022-48899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48899"
},
{
"name": "CVE-2022-48912",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48912"
},
{
"name": "CVE-2022-48913",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48913"
},
{
"name": "CVE-2022-48914",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48914"
},
{
"name": "CVE-2022-48915",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48915"
},
{
"name": "CVE-2022-48921",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48921"
},
{
"name": "CVE-2022-48929",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48929"
},
{
"name": "CVE-2022-48931",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48931"
},
{
"name": "CVE-2022-48934",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48934"
},
{
"name": "CVE-2022-48938",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48938"
},
{
"name": "CVE-2022-48939",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48939"
},
{
"name": "CVE-2022-48942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48942"
},
{
"name": "CVE-2023-52859",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52859"
},
{
"name": "CVE-2023-52898",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52898"
},
{
"name": "CVE-2023-52901",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52901"
},
{
"name": "CVE-2023-52905",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52905"
},
{
"name": "CVE-2023-52906",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52906"
},
{
"name": "CVE-2023-52908",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52908"
},
{
"name": "CVE-2023-52909",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52909"
},
{
"name": "CVE-2023-52910",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52910"
},
{
"name": "CVE-2024-26637",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26637"
},
{
"name": "CVE-2024-26682",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26682"
},
{
"name": "CVE-2024-26683",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26683"
},
{
"name": "CVE-2024-36970",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36970"
},
{
"name": "CVE-2024-39486",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39486"
},
{
"name": "CVE-2024-41010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41010"
},
{
"name": "CVE-2024-41032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41032"
},
{
"name": "CVE-2024-41037",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41037"
},
{
"name": "CVE-2024-41038",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41038"
},
{
"name": "CVE-2024-41039",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41039"
},
{
"name": "CVE-2024-41045",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41045"
},
{
"name": "CVE-2024-41056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41056"
},
{
"name": "CVE-2024-41084",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41084"
},
{
"name": "CVE-2024-41094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41094"
},
{
"name": "CVE-2024-42107",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42107"
},
{
"name": "CVE-2024-42125",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42125"
},
{
"name": "CVE-2024-42132",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42132"
},
{
"name": "CVE-2024-42133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42133"
},
{
"name": "CVE-2024-42138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42138"
},
{
"name": "CVE-2024-42139",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42139"
},
{
"name": "CVE-2024-42141",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42141"
},
{
"name": "CVE-2024-42238",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42238"
},
{
"name": "CVE-2024-42239",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42239"
},
{
"name": "CVE-2024-42241",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42241"
},
{
"name": "CVE-2024-42245",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42245"
},
{
"name": "CVE-2024-42268",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42268"
},
{
"name": "CVE-2024-42278",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42278"
},
{
"name": "CVE-2024-42291",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42291"
},
{
"name": "CVE-2024-42315",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42315"
},
{
"name": "CVE-2024-42316",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42316"
},
{
"name": "CVE-2024-43816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43816"
},
{
"name": "CVE-2024-43817",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43817"
},
{
"name": "CVE-2024-43821",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43821"
},
{
"name": "CVE-2024-43826",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43826"
},
{
"name": "CVE-2024-43840",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43840"
},
{
"name": "CVE-2024-43842",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43842"
},
{
"name": "CVE-2024-43873",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43873"
},
{
"name": "CVE-2024-43874",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43874"
},
{
"name": "CVE-2024-7264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
},
{
"name": "CVE-2024-41031",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41031"
},
{
"name": "CVE-2024-42243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42243"
},
{
"name": "CVE-2024-34459",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34459"
},
{
"name": "CVE-2024-8096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
},
{
"name": "CVE-2024-44983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44983"
},
{
"name": "CVE-2024-44986",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44986"
},
{
"name": "CVE-2024-45000",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45000"
},
{
"name": "CVE-2024-45010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45010"
},
{
"name": "CVE-2024-45019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45019"
},
{
"name": "CVE-2024-45022",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45022"
},
{
"name": "CVE-2024-45029",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45029"
},
{
"name": "CVE-2024-46711",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46711"
},
{
"name": "CVE-2024-46784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46784"
},
{
"name": "CVE-2024-46830",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46830"
},
{
"name": "CVE-2022-48944",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48944"
},
{
"name": "CVE-2024-42294",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42294"
},
{
"name": "CVE-2024-43870",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43870"
},
{
"name": "CVE-2024-44967",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44967"
},
{
"name": "CVE-2024-44984",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44984"
},
{
"name": "CVE-2024-45001",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45001"
},
{
"name": "CVE-2024-45005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45005"
},
{
"name": "CVE-2024-45012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45012"
},
{
"name": "CVE-2024-45013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45013"
},
{
"name": "CVE-2024-45017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45017"
},
{
"name": "CVE-2024-45020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45020"
},
{
"name": "CVE-2024-46672",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46672"
},
{
"name": "CVE-2024-46692",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46692"
},
{
"name": "CVE-2024-46706",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46706"
},
{
"name": "CVE-2024-46709",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46709"
},
{
"name": "CVE-2024-46710",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46710"
},
{
"name": "CVE-2024-46767",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46767"
},
{
"name": "CVE-2024-46786",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46786"
},
{
"name": "CVE-2024-46797",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46797"
},
{
"name": "CVE-2024-37370",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37370"
},
{
"name": "CVE-2024-37371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2024-41085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41085"
},
{
"name": "CVE-2024-26721",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26721"
},
{
"name": "CVE-2024-42258",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42258"
},
{
"name": "CVE-2024-45490",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45490"
},
{
"name": "CVE-2024-7592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7592"
},
{
"name": "CVE-2024-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
},
{
"name": "CVE-2025-54121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54121"
},
{
"name": "CVE-2012-2114",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2114"
},
{
"name": "CVE-2021-46937",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46937"
},
{
"name": "CVE-2021-46999",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46999"
},
{
"name": "CVE-2021-47033",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47033"
},
{
"name": "CVE-2021-47079",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47079"
},
{
"name": "CVE-2021-47092",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47092"
},
{
"name": "CVE-2021-47226",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47226"
},
{
"name": "CVE-2021-47251",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47251"
},
{
"name": "CVE-2021-47266",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47266"
},
{
"name": "CVE-2021-47318",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47318"
},
{
"name": "CVE-2021-47325",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47325"
},
{
"name": "CVE-2021-47346",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47346"
},
{
"name": "CVE-2021-47349",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47349"
},
{
"name": "CVE-2021-47519",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47519"
},
{
"name": "CVE-2021-47561",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47561"
},
{
"name": "CVE-2021-47613",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47613"
},
{
"name": "CVE-2022-1247",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1247"
},
{
"name": "CVE-2022-20153",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20153"
},
{
"name": "CVE-2022-48641",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48641"
},
{
"name": "CVE-2022-48643",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48643"
},
{
"name": "CVE-2022-48707",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48707"
},
{
"name": "CVE-2022-48719",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48719"
},
{
"name": "CVE-2022-48781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48781"
},
{
"name": "CVE-2022-48819",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48819"
},
{
"name": "CVE-2022-48832",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48832"
},
{
"name": "CVE-2022-48848",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48848"
},
{
"name": "CVE-2022-48876",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48876"
},
{
"name": "CVE-2022-48963",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48963"
},
{
"name": "CVE-2022-48974",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48974"
},
{
"name": "CVE-2022-48976",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48976"
},
{
"name": "CVE-2022-48984",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48984"
},
{
"name": "CVE-2022-48986",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48986"
},
{
"name": "CVE-2022-49013",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49013"
},
{
"name": "CVE-2022-49018",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49018"
},
{
"name": "CVE-2022-49048",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49048"
},
{
"name": "CVE-2022-49049",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49049"
},
{
"name": "CVE-2022-49052",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49052"
},
{
"name": "CVE-2022-49072",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49072"
},
{
"name": "CVE-2022-49077",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49077"
},
{
"name": "CVE-2022-49094",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49094"
},
{
"name": "CVE-2022-49152",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49152"
},
{
"name": "CVE-2022-49198",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49198"
},
{
"name": "CVE-2022-49229",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49229"
},
{
"name": "CVE-2022-49231",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49231"
},
{
"name": "CVE-2022-49334",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49334"
},
{
"name": "CVE-2022-49340",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49340"
},
{
"name": "CVE-2022-49374",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49374"
},
{
"name": "CVE-2022-49401",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49401"
},
{
"name": "CVE-2022-49403",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49403"
},
{
"name": "CVE-2022-49450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49450"
},
{
"name": "CVE-2022-49554",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49554"
},
{
"name": "CVE-2022-49557",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49557"
},
{
"name": "CVE-2022-49567",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49567"
},
{
"name": "CVE-2022-49571",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49571"
},
{
"name": "CVE-2022-49572",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49572"
},
{
"name": "CVE-2022-49573",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49573"
},
{
"name": "CVE-2022-49574",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49574"
},
{
"name": "CVE-2022-49575",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49575"
},
{
"name": "CVE-2022-49577",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49577"
},
{
"name": "CVE-2022-49580",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49580"
},
{
"name": "CVE-2022-49585",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49585"
},
{
"name": "CVE-2022-49586",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49586"
},
{
"name": "CVE-2022-49587",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49587"
},
{
"name": "CVE-2022-49593",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49593"
},
{
"name": "CVE-2022-49594",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49594"
},
{
"name": "CVE-2022-49595",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49595"
},
{
"name": "CVE-2022-49596",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49596"
},
{
"name": "CVE-2022-49597",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49597"
},
{
"name": "CVE-2022-49598",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49598"
},
{
"name": "CVE-2022-49599",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49599"
},
{
"name": "CVE-2022-49600",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49600"
},
{
"name": "CVE-2022-49601",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49601"
},
{
"name": "CVE-2022-49602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49602"
},
{
"name": "CVE-2022-49604",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49604"
},
{
"name": "CVE-2022-49612",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49612"
},
{
"name": "CVE-2022-49629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49629"
},
{
"name": "CVE-2022-49633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49633"
},
{
"name": "CVE-2022-49637",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49637"
},
{
"name": "CVE-2022-49639",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49639"
},
{
"name": "CVE-2022-49659",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49659"
},
{
"name": "CVE-2022-49662",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49662"
},
{
"name": "CVE-2022-49691",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49691"
},
{
"name": "CVE-2022-49744",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49744"
},
{
"name": "CVE-2022-49747",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49747"
},
{
"name": "CVE-2022-49752",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49752"
},
{
"name": "CVE-2022-49754",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49754"
},
{
"name": "CVE-2022-49760",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49760"
},
{
"name": "CVE-2023-31082",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31082"
},
{
"name": "CVE-2023-52516",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52516"
},
{
"name": "CVE-2023-52568",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52568"
},
{
"name": "CVE-2023-52570",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52570"
},
{
"name": "CVE-2023-52689",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52689"
},
{
"name": "CVE-2023-52704",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52704"
},
{
"name": "CVE-2023-52706",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52706"
},
{
"name": "CVE-2023-52828",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52828"
},
{
"name": "CVE-2023-52902",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52902"
},
{
"name": "CVE-2023-52932",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52932"
},
{
"name": "CVE-2023-52934",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52934"
},
{
"name": "CVE-2023-52940",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52940"
},
{
"name": "CVE-2023-52942",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52942"
},
{
"name": "CVE-2023-52977",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52977"
},
{
"name": "CVE-2023-52985",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52985"
},
{
"name": "CVE-2023-52987",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52987"
},
{
"name": "CVE-2023-52991",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52991"
},
{
"name": "CVE-2023-53004",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53004"
},
{
"name": "CVE-2023-53017",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53017"
},
{
"name": "CVE-2024-23196",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23196"
},
{
"name": "CVE-2024-26678",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26678"
},
{
"name": "CVE-2024-26725",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26725"
},
{
"name": "CVE-2024-26746",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26746"
},
{
"name": "CVE-2024-26918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26918"
},
{
"name": "CVE-2024-27023",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27023"
},
{
"name": "CVE-2024-40907",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40907"
},
{
"name": "CVE-2024-43896",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43896"
},
{
"name": "CVE-2024-46748",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46748"
},
{
"name": "CVE-2024-46862",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46862"
},
{
"name": "CVE-2024-53073",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53073"
},
{
"name": "CVE-2024-53225",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53225"
},
{
"name": "CVE-2024-56668",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56668"
},
{
"name": "CVE-2024-57852",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57852"
},
{
"name": "CVE-2024-57914",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57914"
},
{
"name": "CVE-2024-57985",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57985"
},
{
"name": "CVE-2024-57989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57989"
},
{
"name": "CVE-2024-58064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58064"
},
{
"name": "CVE-2024-58075",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58075"
},
{
"name": "CVE-2024-58084",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58084"
},
{
"name": "CVE-2025-21709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21709"
},
{
"name": "CVE-2025-21807",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21807"
},
{
"name": "CVE-2025-21817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21817"
},
{
"name": "CVE-2025-21827",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21827"
},
{
"name": "CVE-2025-21851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21851"
},
{
"name": "CVE-2025-21874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21874"
},
{
"name": "CVE-2025-21907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21907"
},
{
"name": "CVE-2025-21921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21921"
},
{
"name": "CVE-2025-24357",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24357"
},
{
"name": "CVE-2025-25183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25183"
},
{
"name": "CVE-2025-29770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29770"
},
{
"name": "CVE-2025-30165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30165"
},
{
"name": "CVE-2025-30202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30202"
},
{
"name": "CVE-2025-32381",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32381"
},
{
"name": "CVE-2025-32444",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32444"
},
{
"name": "CVE-2025-46570",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46570"
},
{
"name": "CVE-2025-47277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47277"
},
{
"name": "CVE-2025-48887",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48887"
},
{
"name": "CVE-2025-48956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48956"
},
{
"name": "CVE-2025-57809",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-57809"
},
{
"name": "CVE-2025-62372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62372"
},
{
"name": "CVE-2025-62426",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62426"
},
{
"name": "CVE-2025-65106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-65106"
},
{
"name": "CVE-2024-9681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
},
{
"name": "CVE-2024-11168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
},
{
"name": "CVE-2022-48879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48879"
},
{
"name": "CVE-2022-48946",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48946"
},
{
"name": "CVE-2022-48951",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48951"
},
{
"name": "CVE-2022-48953",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48953"
},
{
"name": "CVE-2022-48969",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48969"
},
{
"name": "CVE-2022-48971",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48971"
},
{
"name": "CVE-2022-48972",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48972"
},
{
"name": "CVE-2022-48978",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48978"
},
{
"name": "CVE-2022-48981",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48981"
},
{
"name": "CVE-2022-48985",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48985"
},
{
"name": "CVE-2022-48987",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48987"
},
{
"name": "CVE-2022-48988",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48988"
},
{
"name": "CVE-2022-48992",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48992"
},
{
"name": "CVE-2022-48994",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48994"
},
{
"name": "CVE-2022-48997",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48997"
},
{
"name": "CVE-2022-49005",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49005"
},
{
"name": "CVE-2022-49006",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49006"
},
{
"name": "CVE-2022-49011",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49011"
},
{
"name": "CVE-2022-49012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49012"
},
{
"name": "CVE-2022-49014",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49014"
},
{
"name": "CVE-2022-49015",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49015"
},
{
"name": "CVE-2022-49017",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49017"
},
{
"name": "CVE-2022-49021",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49021"
},
{
"name": "CVE-2022-49022",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49022"
},
{
"name": "CVE-2022-49024",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49024"
},
{
"name": "CVE-2022-49027",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49027"
},
{
"name": "CVE-2022-49028",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49028"
},
{
"name": "CVE-2022-49029",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49029"
},
{
"name": "CVE-2024-44932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44932"
},
{
"name": "CVE-2024-44964",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44964"
},
{
"name": "CVE-2024-46766",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46766"
},
{
"name": "CVE-2024-46825",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46825"
},
{
"name": "CVE-2024-46864",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46864"
},
{
"name": "CVE-2024-43869",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43869"
},
{
"name": "CVE-2024-47672",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47672"
},
{
"name": "CVE-2024-47675",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47675"
},
{
"name": "CVE-2024-47682",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47682"
},
{
"name": "CVE-2024-47687",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47687"
},
{
"name": "CVE-2024-47696",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47696"
},
{
"name": "CVE-2024-47702",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47702"
},
{
"name": "CVE-2024-47715",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47715"
},
{
"name": "CVE-2024-47719",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47719"
},
{
"name": "CVE-2024-47727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47727"
},
{
"name": "CVE-2024-49855",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49855"
},
{
"name": "CVE-2024-49862",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49862"
},
{
"name": "CVE-2024-49864",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49864"
},
{
"name": "CVE-2024-49866",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49866"
},
{
"name": "CVE-2024-49870",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49870"
},
{
"name": "CVE-2024-49886",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49886"
},
{
"name": "CVE-2024-49946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49946"
},
{
"name": "CVE-2024-49953",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49953"
},
{
"name": "CVE-2024-50000",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50000"
},
{
"name": "CVE-2024-50019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50019"
},
{
"name": "CVE-2024-50020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50020"
},
{
"name": "CVE-2024-50021",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50021"
},
{
"name": "CVE-2024-50022",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50022"
},
{
"name": "CVE-2024-50023",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50023"
},
{
"name": "CVE-2024-50027",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50027"
},
{
"name": "CVE-2024-50041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50041"
},
{
"name": "CVE-2024-50042",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50042"
},
{
"name": "CVE-2024-50060",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50060"
},
{
"name": "CVE-2024-50064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50064"
},
{
"name": "CVE-2024-50074",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50074"
},
{
"name": "CVE-2024-50075",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50075"
},
{
"name": "CVE-2024-50076",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50076"
},
{
"name": "CVE-2024-50077",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50077"
},
{
"name": "CVE-2024-50078",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50078"
},
{
"name": "CVE-2024-50081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50081"
},
{
"name": "CVE-2024-46824",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46824"
},
{
"name": "CVE-2024-50126",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50126"
},
{
"name": "CVE-2024-50215",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50215"
},
{
"name": "CVE-2024-50235",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50235"
},
{
"name": "CVE-2024-50250",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50250"
},
{
"name": "CVE-2024-50252",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50252"
},
{
"name": "CVE-2024-50255",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50255"
},
{
"name": "CVE-2024-50259",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50259"
},
{
"name": "CVE-2024-50261",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50261"
},
{
"name": "CVE-2024-50271",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50271"
},
{
"name": "CVE-2024-53042",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53042"
},
{
"name": "CVE-2024-53055",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53055"
},
{
"name": "CVE-2024-53070",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53070"
},
{
"name": "CVE-2024-53072",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53072"
},
{
"name": "CVE-2024-53082",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53082"
},
{
"name": "CVE-2024-50226",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50226"
},
{
"name": "CVE-2024-11053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
},
{
"name": "CVE-2024-44994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44994"
},
{
"name": "CVE-2024-50110",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50110"
},
{
"name": "CVE-2024-42317",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42317"
},
{
"name": "CVE-2024-43820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43820"
},
{
"name": "CVE-2024-43888",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43888"
},
{
"name": "CVE-2024-43910",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43910"
},
{
"name": "CVE-2024-44975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44975"
},
{
"name": "CVE-2024-44996",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44996"
},
{
"name": "CVE-2024-45027",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45027"
},
{
"name": "CVE-2024-46697",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46697"
},
{
"name": "CVE-2024-46698",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46698"
},
{
"name": "CVE-2024-46788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46788"
},
{
"name": "CVE-2024-46793",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46793"
},
{
"name": "CVE-2024-46845",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46845"
},
{
"name": "CVE-2024-47734",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47734"
},
{
"name": "CVE-2024-49856",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49856"
},
{
"name": "CVE-2024-49977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49977"
},
{
"name": "CVE-2024-50093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50093"
},
{
"name": "CVE-2024-50186",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50186"
},
{
"name": "CVE-2024-50189",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50189"
},
{
"name": "CVE-2022-48982",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48982"
},
{
"name": "CVE-2022-48983",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48983"
},
{
"name": "CVE-2022-48989",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48989"
},
{
"name": "CVE-2023-52778",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52778"
},
{
"name": "CVE-2024-49976",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49976"
},
{
"name": "CVE-2024-50101",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50101"
},
{
"name": "CVE-2024-50102",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50102"
},
{
"name": "CVE-2024-50121",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50121"
},
{
"name": "CVE-2024-50124",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50124"
},
{
"name": "CVE-2024-50125",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50125"
},
{
"name": "CVE-2024-50128",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50128"
},
{
"name": "CVE-2024-50136",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50136"
},
{
"name": "CVE-2024-50139",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50139"
},
{
"name": "CVE-2024-50141",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50141"
},
{
"name": "CVE-2024-50145",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50145"
},
{
"name": "CVE-2024-50146",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50146"
},
{
"name": "CVE-2024-50147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50147"
},
{
"name": "CVE-2024-50153",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50153"
},
{
"name": "CVE-2024-50155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50155"
},
{
"name": "CVE-2024-50157",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50157"
},
{
"name": "CVE-2024-50158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50158"
},
{
"name": "CVE-2024-50160",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50160"
},
{
"name": "CVE-2024-50169",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50169"
},
{
"name": "CVE-2024-50172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50172"
},
{
"name": "CVE-2024-50182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50182"
},
{
"name": "CVE-2024-50200",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50200"
},
{
"name": "CVE-2024-50216",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50216"
},
{
"name": "CVE-2024-50274",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50274"
},
{
"name": "CVE-2024-50275",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50275"
},
{
"name": "CVE-2024-53045",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53045"
},
{
"name": "CVE-2024-53048",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53048"
},
{
"name": "CVE-2024-53074",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53074"
},
{
"name": "CVE-2024-53085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53085"
},
{
"name": "CVE-2024-53110",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53110"
},
{
"name": "CVE-2024-50162",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50162"
},
{
"name": "CVE-2024-50163",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50163"
},
{
"name": "CVE-2024-53097",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53097"
},
{
"name": "CVE-2024-53113",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53113"
},
{
"name": "CVE-2024-53120",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53120"
},
{
"name": "CVE-2024-53123",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53123"
},
{
"name": "CVE-2024-53136",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53136"
},
{
"name": "CVE-2024-53064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53064"
},
{
"name": "CVE-2024-53105",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53105"
},
{
"name": "CVE-2024-53117",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53117"
},
{
"name": "CVE-2024-53118",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53118"
},
{
"name": "CVE-2024-53134",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53134"
},
{
"name": "CVE-2024-53151",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53151"
},
{
"name": "CVE-2024-53160",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53160"
},
{
"name": "CVE-2024-53166",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53166"
},
{
"name": "CVE-2024-53169",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53169"
},
{
"name": "CVE-2024-53202",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53202"
},
{
"name": "CVE-2024-53206",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53206"
},
{
"name": "CVE-2024-53207",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53207"
},
{
"name": "CVE-2024-53208",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53208"
},
{
"name": "CVE-2024-53213",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53213"
},
{
"name": "CVE-2024-53215",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53215"
},
{
"name": "CVE-2024-53222",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53222"
},
{
"name": "CVE-2024-53229",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53229"
},
{
"name": "CVE-2024-56549",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56549"
},
{
"name": "CVE-2024-56667",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56667"
},
{
"name": "CVE-2024-56752",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56752"
},
{
"name": "CVE-2024-48873",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-48873"
},
{
"name": "CVE-2024-49951",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49951"
},
{
"name": "CVE-2024-53091",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53091"
},
{
"name": "CVE-2024-53170",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53170"
},
{
"name": "CVE-2024-53175",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53175"
},
{
"name": "CVE-2024-53185",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53185"
},
{
"name": "CVE-2024-53230",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53230"
},
{
"name": "CVE-2024-53231",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53231"
},
{
"name": "CVE-2024-53232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53232"
},
{
"name": "CVE-2024-53236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53236"
},
{
"name": "CVE-2024-55881",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-55881"
},
{
"name": "CVE-2024-56372",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56372"
},
{
"name": "CVE-2025-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
},
{
"name": "CVE-2024-53238",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53238"
},
{
"name": "CVE-2024-56617",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56617"
},
{
"name": "CVE-2024-56625",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56625"
},
{
"name": "CVE-2024-56632",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56632"
},
{
"name": "CVE-2024-56654",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56654"
},
{
"name": "CVE-2024-56663",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56663"
},
{
"name": "CVE-2024-56675",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56675"
},
{
"name": "CVE-2024-56708",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56708"
},
{
"name": "CVE-2024-56709",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56709"
},
{
"name": "CVE-2024-56729",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56729"
},
{
"name": "CVE-2024-56745",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56745"
},
{
"name": "CVE-2024-56760",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56760"
},
{
"name": "CVE-2024-56765",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56765"
},
{
"name": "CVE-2024-57793",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57793"
},
{
"name": "CVE-2024-57804",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57804"
},
{
"name": "CVE-2024-57932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57932"
},
{
"name": "CVE-2024-57933",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57933"
},
{
"name": "CVE-2024-57936",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57936"
},
{
"name": "CVE-2025-21645",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21645"
},
{
"name": "CVE-2025-21649",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21649"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2025-0725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
},
{
"name": "CVE-2024-46820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46820"
},
{
"name": "CVE-2024-50602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50602"
},
{
"name": "CVE-2024-53047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53047"
},
{
"name": "CVE-2024-56679",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56679"
},
{
"name": "CVE-2024-56707",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56707"
},
{
"name": "CVE-2024-56725",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56725"
},
{
"name": "CVE-2024-56726",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56726"
},
{
"name": "CVE-2024-56727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56727"
},
{
"name": "CVE-2024-57882",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57882"
},
{
"name": "CVE-2024-57917",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57917"
},
{
"name": "CVE-2025-21663",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21663"
},
{
"name": "CVE-2025-21670",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21670"
},
{
"name": "CVE-2024-50164",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50164"
},
{
"name": "CVE-2025-21647",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21647"
},
{
"name": "CVE-2025-21668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21668"
},
{
"name": "CVE-2025-21671",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21671"
},
{
"name": "CVE-2025-21681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21681"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2021-47222",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47222"
},
{
"name": "CVE-2021-47223",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47223"
},
{
"name": "CVE-2025-21673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21673"
},
{
"name": "CVE-2024-47700",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47700"
},
{
"name": "CVE-2024-49880",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49880"
},
{
"name": "CVE-2024-49885",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49885"
},
{
"name": "CVE-2024-49999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49999"
},
{
"name": "CVE-2024-50029",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50029"
},
{
"name": "CVE-2024-50107",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50107"
},
{
"name": "CVE-2024-50109",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50109"
},
{
"name": "CVE-2024-50114",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50114"
},
{
"name": "CVE-2024-50120",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50120"
},
{
"name": "CVE-2024-50152",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50152"
},
{
"name": "CVE-2024-50165",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50165"
},
{
"name": "CVE-2024-50197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50197"
},
{
"name": "CVE-2024-50207",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50207"
},
{
"name": "CVE-2024-50223",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50223"
},
{
"name": "CVE-2024-50294",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50294"
},
{
"name": "CVE-2024-50303",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50303"
},
{
"name": "CVE-2024-53044",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53044"
},
{
"name": "CVE-2024-53109",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53109"
},
{
"name": "CVE-2024-53167",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53167"
},
{
"name": "CVE-2024-53176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53176"
},
{
"name": "CVE-2024-53178",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53178"
},
{
"name": "CVE-2024-53189",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53189"
},
{
"name": "CVE-2024-56535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56535"
},
{
"name": "CVE-2024-56545",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56545"
},
{
"name": "CVE-2024-56696",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56696"
},
{
"name": "CVE-2024-56702",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56702"
},
{
"name": "CVE-2024-56742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56742"
},
{
"name": "CVE-2025-1795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1795"
},
{
"name": "CVE-2024-56783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56783"
},
{
"name": "CVE-2025-21694",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21694"
},
{
"name": "CVE-2022-49080",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49080"
},
{
"name": "CVE-2022-49089",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49089"
},
{
"name": "CVE-2024-57994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57994"
},
{
"name": "CVE-2025-21705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21705"
},
{
"name": "CVE-2025-21716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21716"
},
{
"name": "CVE-2025-21724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21724"
},
{
"name": "CVE-2025-21725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21725"
},
{
"name": "CVE-2025-21790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21790"
},
{
"name": "CVE-2025-21795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21795"
},
{
"name": "CVE-2022-49043",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49043"
},
{
"name": "CVE-2024-45336",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45336"
},
{
"name": "CVE-2024-45341",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45341"
},
{
"name": "CVE-2025-22866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22866"
},
{
"name": "CVE-2021-47648",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47648"
},
{
"name": "CVE-2021-47649",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47649"
},
{
"name": "CVE-2021-47650",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47650"
},
{
"name": "CVE-2021-47659",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47659"
},
{
"name": "CVE-2022-49058",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49058"
},
{
"name": "CVE-2022-49061",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49061"
},
{
"name": "CVE-2022-49065",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49065"
},
{
"name": "CVE-2022-49066",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49066"
},
{
"name": "CVE-2022-49074",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49074"
},
{
"name": "CVE-2022-49086",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49086"
},
{
"name": "CVE-2022-49090",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49090"
},
{
"name": "CVE-2022-49092",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49092"
},
{
"name": "CVE-2022-49097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49097"
},
{
"name": "CVE-2022-49100",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49100"
},
{
"name": "CVE-2022-49103",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49103"
},
{
"name": "CVE-2022-49107",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49107"
},
{
"name": "CVE-2022-49118",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49118"
},
{
"name": "CVE-2022-49122",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49122"
},
{
"name": "CVE-2022-49130",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49130"
},
{
"name": "CVE-2022-49145",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49145"
},
{
"name": "CVE-2022-49147",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49147"
},
{
"name": "CVE-2022-49148",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49148"
},
{
"name": "CVE-2022-49153",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49153"
},
{
"name": "CVE-2022-49154",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49154"
},
{
"name": "CVE-2022-49155",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49155"
},
{
"name": "CVE-2022-49156",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49156"
},
{
"name": "CVE-2022-49159",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49159"
},
{
"name": "CVE-2022-49174",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49174"
},
{
"name": "CVE-2022-49175",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49175"
},
{
"name": "CVE-2022-49180",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49180"
},
{
"name": "CVE-2022-49187",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49187"
},
{
"name": "CVE-2022-49188",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49188"
},
{
"name": "CVE-2022-49206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49206"
},
{
"name": "CVE-2022-49208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49208"
},
{
"name": "CVE-2022-49216",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49216"
},
{
"name": "CVE-2022-49227",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49227"
},
{
"name": "CVE-2022-49257",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49257"
},
{
"name": "CVE-2022-49259",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49259"
},
{
"name": "CVE-2022-49262",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49262"
},
{
"name": "CVE-2022-49263",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49263"
},
{
"name": "CVE-2022-49264",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49264"
},
{
"name": "CVE-2022-49266",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49266"
},
{
"name": "CVE-2022-49268",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49268"
},
{
"name": "CVE-2022-49269",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49269"
},
{
"name": "CVE-2022-49272",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49272"
},
{
"name": "CVE-2022-49273",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49273"
},
{
"name": "CVE-2022-49279",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49279"
},
{
"name": "CVE-2022-49286",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49286"
},
{
"name": "CVE-2022-49290",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49290"
},
{
"name": "CVE-2022-49297",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49297"
},
{
"name": "CVE-2022-49307",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49307"
},
{
"name": "CVE-2022-49308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49308"
},
{
"name": "CVE-2022-49321",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49321"
},
{
"name": "CVE-2022-49322",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49322"
},
{
"name": "CVE-2022-49323",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49323"
},
{
"name": "CVE-2022-49339",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49339"
},
{
"name": "CVE-2022-49341",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49341"
},
{
"name": "CVE-2022-49343",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49343"
},
{
"name": "CVE-2022-49345",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49345"
},
{
"name": "CVE-2022-49350",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49350"
},
{
"name": "CVE-2022-49352",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49352"
},
{
"name": "CVE-2022-49356",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49356"
},
{
"name": "CVE-2022-49357",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49357"
},
{
"name": "CVE-2022-49376",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49376"
},
{
"name": "CVE-2022-49378",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49378"
},
{
"name": "CVE-2022-49379",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49379"
},
{
"name": "CVE-2022-49384",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49384"
},
{
"name": "CVE-2022-49394",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49394"
},
{
"name": "CVE-2022-49400",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49400"
},
{
"name": "CVE-2022-49402",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49402"
},
{
"name": "CVE-2022-49404",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49404"
},
{
"name": "CVE-2022-49407",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49407"
},
{
"name": "CVE-2022-49409",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49409"
},
{
"name": "CVE-2022-49422",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49422"
},
{
"name": "CVE-2022-49432",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49432"
},
{
"name": "CVE-2022-49433",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49433"
},
{
"name": "CVE-2022-49434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49434"
},
{
"name": "CVE-2022-49441",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49441"
},
{
"name": "CVE-2022-49447",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49447"
},
{
"name": "CVE-2022-49455",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49455"
},
{
"name": "CVE-2022-49468",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49468"
},
{
"name": "CVE-2022-49472",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49472"
},
{
"name": "CVE-2022-49475",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49475"
},
{
"name": "CVE-2022-49481",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49481"
},
{
"name": "CVE-2022-49486",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49486"
},
{
"name": "CVE-2022-49492",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49492"
},
{
"name": "CVE-2022-49498",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49498"
},
{
"name": "CVE-2022-49503",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49503"
},
{
"name": "CVE-2022-49508",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49508"
},
{
"name": "CVE-2022-49515",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49515"
},
{
"name": "CVE-2022-49519",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49519"
},
{
"name": "CVE-2022-49520",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49520"
},
{
"name": "CVE-2022-49521",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49521"
},
{
"name": "CVE-2022-49523",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49523"
},
{
"name": "CVE-2022-49526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49526"
},
{
"name": "CVE-2022-49532",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49532"
},
{
"name": "CVE-2022-49545",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49545"
},
{
"name": "CVE-2022-49559",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49559"
},
{
"name": "CVE-2022-49581",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49581"
},
{
"name": "CVE-2022-49583",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49583"
},
{
"name": "CVE-2022-49584",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49584"
},
{
"name": "CVE-2022-49592",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49592"
},
{
"name": "CVE-2022-49603",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49603"
},
{
"name": "CVE-2022-49605",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49605"
},
{
"name": "CVE-2022-49606",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49606"
},
{
"name": "CVE-2022-49607",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49607"
},
{
"name": "CVE-2022-49611",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49611"
},
{
"name": "CVE-2022-49613",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49613"
},
{
"name": "CVE-2022-49625",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49625"
},
{
"name": "CVE-2022-49627",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49627"
},
{
"name": "CVE-2022-49631",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49631"
},
{
"name": "CVE-2022-49634",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49634"
},
{
"name": "CVE-2022-49640",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49640"
},
{
"name": "CVE-2022-49641",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49641"
},
{
"name": "CVE-2022-49642",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49642"
},
{
"name": "CVE-2022-49643",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49643"
},
{
"name": "CVE-2022-49646",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49646"
},
{
"name": "CVE-2022-49648",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49648"
},
{
"name": "CVE-2022-49653",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49653"
},
{
"name": "CVE-2022-49656",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49656"
},
{
"name": "CVE-2022-49657",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49657"
},
{
"name": "CVE-2022-49663",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49663"
},
{
"name": "CVE-2022-49670",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49670"
},
{
"name": "CVE-2022-49671",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49671"
},
{
"name": "CVE-2022-49672",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49672"
},
{
"name": "CVE-2022-49673",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49673"
},
{
"name": "CVE-2022-49674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49674"
},
{
"name": "CVE-2022-49675",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49675"
},
{
"name": "CVE-2022-49679",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49679"
},
{
"name": "CVE-2022-49688",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49688"
},
{
"name": "CVE-2022-49699",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49699"
},
{
"name": "CVE-2022-49707",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49707"
},
{
"name": "CVE-2022-49708",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49708"
},
{
"name": "CVE-2022-49710",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49710"
},
{
"name": "CVE-2022-49716",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49716"
},
{
"name": "CVE-2022-49721",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49721"
},
{
"name": "CVE-2022-49723",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49723"
},
{
"name": "CVE-2022-49726",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49726"
},
{
"name": "CVE-2022-49731",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49731"
},
{
"name": "CVE-2024-48876",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-48876"
},
{
"name": "CVE-2024-53681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53681"
},
{
"name": "CVE-2024-54460",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54460"
},
{
"name": "CVE-2024-55642",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-55642"
},
{
"name": "CVE-2024-56613",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56613"
},
{
"name": "CVE-2024-56624",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56624"
},
{
"name": "CVE-2024-56638",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56638"
},
{
"name": "CVE-2024-56653",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56653"
},
{
"name": "CVE-2024-56657",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56657"
},
{
"name": "CVE-2024-56669",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56669"
},
{
"name": "CVE-2024-56710",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56710"
},
{
"name": "CVE-2024-56714",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56714"
},
{
"name": "CVE-2024-56772",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56772"
},
{
"name": "CVE-2024-56773",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56773"
},
{
"name": "CVE-2024-57878",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57878"
},
{
"name": "CVE-2024-57879",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57879"
},
{
"name": "CVE-2024-57885",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57885"
},
{
"name": "CVE-2025-21644",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21644"
},
{
"name": "CVE-2025-21659",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21659"
},
{
"name": "CVE-2024-56171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56171"
},
{
"name": "CVE-2025-27113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27113"
},
{
"name": "CVE-2024-57993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57993"
},
{
"name": "CVE-2024-58009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58009"
},
{
"name": "CVE-2024-58061",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58061"
},
{
"name": "CVE-2024-58068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58068"
},
{
"name": "CVE-2024-58077",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58077"
},
{
"name": "CVE-2025-21706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21706"
},
{
"name": "CVE-2025-21707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21707"
},
{
"name": "CVE-2025-21829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21829"
},
{
"name": "CVE-2025-21830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21830"
},
{
"name": "CVE-2025-21832",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21832"
},
{
"name": "CVE-2022-49057",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49057"
},
{
"name": "CVE-2022-49062",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49062"
},
{
"name": "CVE-2022-49064",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49064"
},
{
"name": "CVE-2022-49070",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49070"
},
{
"name": "CVE-2022-49139",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49139"
},
{
"name": "CVE-2022-49204",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49204"
},
{
"name": "CVE-2022-49205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49205"
},
{
"name": "CVE-2022-49207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49207"
},
{
"name": "CVE-2022-49209",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49209"
},
{
"name": "CVE-2022-49225",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49225"
},
{
"name": "CVE-2022-49228",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49228"
},
{
"name": "CVE-2022-49237",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49237"
},
{
"name": "CVE-2022-49330",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49330"
},
{
"name": "CVE-2022-49353",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49353"
},
{
"name": "CVE-2022-49406",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49406"
},
{
"name": "CVE-2022-49436",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49436"
},
{
"name": "CVE-2022-49446",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49446"
},
{
"name": "CVE-2022-49476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49476"
},
{
"name": "CVE-2022-49511",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49511"
},
{
"name": "CVE-2022-49518",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49518"
},
{
"name": "CVE-2022-49538",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49538"
},
{
"name": "CVE-2022-49548",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49548"
},
{
"name": "CVE-2022-49552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49552"
},
{
"name": "CVE-2022-49560",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49560"
},
{
"name": "CVE-2022-49565",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49565"
},
{
"name": "CVE-2022-49624",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49624"
},
{
"name": "CVE-2022-49638",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49638"
},
{
"name": "CVE-2022-49655",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49655"
},
{
"name": "CVE-2022-49658",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49658"
},
{
"name": "CVE-2022-49697",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49697"
},
{
"name": "CVE-2022-49732",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49732"
},
{
"name": "CVE-2022-49739",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49739"
},
{
"name": "CVE-2022-49746",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49746"
},
{
"name": "CVE-2022-49759",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49759"
},
{
"name": "CVE-2023-52933",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52933"
},
{
"name": "CVE-2023-52941",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52941"
},
{
"name": "CVE-2023-52976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52976"
},
{
"name": "CVE-2023-52984",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52984"
},
{
"name": "CVE-2023-52992",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52992"
},
{
"name": "CVE-2023-52993",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52993"
},
{
"name": "CVE-2023-53006",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53006"
},
{
"name": "CVE-2023-53007",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53007"
},
{
"name": "CVE-2023-53015",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53015"
},
{
"name": "CVE-2023-53016",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53016"
},
{
"name": "CVE-2023-53019",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53019"
},
{
"name": "CVE-2023-53026",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53026"
},
{
"name": "CVE-2023-53029",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53029"
},
{
"name": "CVE-2023-53030",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53030"
},
{
"name": "CVE-2023-53033",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53033"
},
{
"name": "CVE-2024-46736",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46736"
},
{
"name": "CVE-2024-46796",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46796"
},
{
"name": "CVE-2024-57990",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57990"
},
{
"name": "CVE-2024-57999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57999"
},
{
"name": "CVE-2024-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58057"
},
{
"name": "CVE-2024-58078",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58078"
},
{
"name": "CVE-2024-58079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58079"
},
{
"name": "CVE-2025-21723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21723"
},
{
"name": "CVE-2025-21732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21732"
},
{
"name": "CVE-2025-21810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21810"
},
{
"name": "CVE-2025-21825",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21825"
},
{
"name": "CVE-2025-21828",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21828"
},
{
"name": "CVE-2025-21844",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21844"
},
{
"name": "CVE-2025-21847",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21847"
},
{
"name": "CVE-2025-21856",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21856"
},
{
"name": "CVE-2025-21857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21857"
},
{
"name": "CVE-2025-21864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21864"
},
{
"name": "CVE-2025-21869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21869"
},
{
"name": "CVE-2025-21870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21870"
},
{
"name": "CVE-2025-21876",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21876"
},
{
"name": "CVE-2025-21883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21883"
},
{
"name": "CVE-2025-21886",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21886"
},
{
"name": "CVE-2025-21888",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21888"
},
{
"name": "CVE-2025-21890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21890"
},
{
"name": "CVE-2024-8176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8176"
},
{
"name": "CVE-2025-24928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24928"
},
{
"name": "CVE-2025-21913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21913"
},
{
"name": "CVE-2025-21916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21916"
},
{
"name": "CVE-2025-21918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21918"
},
{
"name": "CVE-2025-21924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21924"
},
{
"name": "CVE-2025-21936",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21936"
},
{
"name": "CVE-2025-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21938"
},
{
"name": "CVE-2025-21962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21962"
},
{
"name": "CVE-2025-21963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21963"
},
{
"name": "CVE-2025-21964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21964"
},
{
"name": "CVE-2025-21978",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21978"
},
{
"name": "CVE-2025-21979",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21979"
},
{
"name": "CVE-2025-21986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21986"
},
{
"name": "CVE-2022-49220",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49220"
},
{
"name": "CVE-2022-49372",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49372"
},
{
"name": "CVE-2022-49578",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49578"
},
{
"name": "CVE-2022-49589",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49589"
},
{
"name": "CVE-2022-49620",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49620"
},
{
"name": "CVE-2023-52997",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52997"
},
{
"name": "CVE-2023-53031",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53031"
},
{
"name": "CVE-2024-57952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57952"
},
{
"name": "CVE-2025-21691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21691"
},
{
"name": "CVE-2025-27516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27516"
},
{
"name": "CVE-2025-21953",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21953"
},
{
"name": "CVE-2025-4516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4516"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2025-32414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32414"
},
{
"name": "CVE-2025-32415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32415"
},
{
"name": "CVE-2022-49171",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49171"
},
{
"name": "CVE-2022-49197",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49197"
},
{
"name": "CVE-2022-49561",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49561"
},
{
"name": "CVE-2022-49590",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49590"
},
{
"name": "CVE-2023-52928",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52928"
},
{
"name": "CVE-2023-52937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52937"
},
{
"name": "CVE-2023-52938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52938"
},
{
"name": "CVE-2023-52981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52981"
},
{
"name": "CVE-2023-52982",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52982"
},
{
"name": "CVE-2023-52986",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52986"
},
{
"name": "CVE-2023-53009",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53009"
},
{
"name": "CVE-2023-53032",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53032"
},
{
"name": "CVE-2024-58070",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58070"
},
{
"name": "CVE-2024-58088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58088"
},
{
"name": "CVE-2025-21808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21808"
},
{
"name": "CVE-2025-21836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21836"
},
{
"name": "CVE-2025-21854",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21854"
},
{
"name": "CVE-2025-21884",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21884"
},
{
"name": "CVE-2025-21889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21889"
},
{
"name": "CVE-2025-21895",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21895"
},
{
"name": "CVE-2025-21906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21906"
},
{
"name": "CVE-2025-21908",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21908"
},
{
"name": "CVE-2025-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21930"
},
{
"name": "CVE-2025-21961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21961"
},
{
"name": "CVE-2025-21966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21966"
},
{
"name": "CVE-2025-4947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4947"
},
{
"name": "CVE-2025-5025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5025"
},
{
"name": "CVE-2024-56433",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56433"
},
{
"name": "CVE-2025-1390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1390"
},
{
"name": "CVE-2025-29088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29088"
},
{
"name": "CVE-2025-32434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32434"
},
{
"name": "CVE-2025-43859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43859"
},
{
"name": "CVE-2024-58074",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58074"
},
{
"name": "CVE-2025-21974",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21974"
},
{
"name": "CVE-2025-6021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"
},
{
"name": "CVE-2022-49636",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49636"
},
{
"name": "CVE-2025-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21939"
},
{
"name": "CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"name": "CVE-2025-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3576"
},
{
"name": "CVE-2024-57987",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57987"
},
{
"name": "CVE-2024-57988",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57988"
},
{
"name": "CVE-2024-57995",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57995"
},
{
"name": "CVE-2024-58015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58015"
},
{
"name": "CVE-2024-58062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58062"
},
{
"name": "CVE-2025-21713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21713"
},
{
"name": "CVE-2025-21770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21770"
},
{
"name": "CVE-2025-21880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21880"
},
{
"name": "CVE-2021-3995",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3995"
},
{
"name": "CVE-2021-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3996"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2025-21809",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21809"
},
{
"name": "CVE-2025-8194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
},
{
"name": "CVE-2025-50182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50182"
},
{
"name": "CVE-2021-47316",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47316"
},
{
"name": "CVE-2021-32256",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32256"
},
{
"name": "CVE-2024-25260",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25260"
},
{
"name": "CVE-2025-1371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1371"
},
{
"name": "CVE-2025-1376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1376"
},
{
"name": "CVE-2025-1377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1377"
},
{
"name": "CVE-2025-49794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49794"
},
{
"name": "CVE-2025-49796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
},
{
"name": "CVE-2024-54456",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54456"
},
{
"name": "CVE-2025-21783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21783"
},
{
"name": "CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"name": "CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"name": "CVE-2024-26462",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26462"
},
{
"name": "CVE-2025-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1352"
},
{
"name": "CVE-2025-1365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1365"
},
{
"name": "CVE-2025-1372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1372"
},
{
"name": "CVE-2025-27587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27587"
},
{
"name": "CVE-2025-49795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49795"
},
{
"name": "CVE-2025-6170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6170"
},
{
"name": "CVE-2025-8732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8732"
},
{
"name": "CVE-2025-9086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9086"
},
{
"name": "CVE-2025-41248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41248"
}
],
"initial_release_date": "2025-12-02T00:00:00",
"last_revision_date": "2025-12-02T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-1057",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-12-02T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2025-12-01",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36560",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36560"
},
{
"published_at": "2025-12-01",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36564",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36564"
}
]
}
CERTFR-2025-AVI-1057
Vulnerability from certfr_avis - Published: 2025-12-02 - Updated: 2025-12-02
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 16.x antérieures à 16.11.0 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 14.x antérieures à 14.20.0 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 17.x antérieures à 17.7.0 | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Hub versions antérieures à 10.3.1 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 18.x antérieures à 18.1.0 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 15.x antérieures à 15.15.0 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 13.x antérieures à 13.23.0 |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Tanzu pour Postgres versions 16.x ant\u00e9rieures \u00e0 16.11.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions 14.x ant\u00e9rieures \u00e0 14.20.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions 17.x ant\u00e9rieures \u00e0 17.7.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Hub versions ant\u00e9rieures \u00e0 10.3.1",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions 18.x ant\u00e9rieures \u00e0 18.1.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions 15.x ant\u00e9rieures \u00e0 15.15.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions 13.x ant\u00e9rieures \u00e0 13.23.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2019-12900",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12900"
},
{
"name": "CVE-2019-25013",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25013"
},
{
"name": "CVE-2020-28196",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28196"
},
{
"name": "CVE-2020-10029",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10029"
},
{
"name": "CVE-2019-18276",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18276"
},
{
"name": "CVE-2021-3421",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3421"
},
{
"name": "CVE-2021-3326",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3326"
},
{
"name": "CVE-2020-27618",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27618"
},
{
"name": "CVE-2021-20227",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20227"
},
{
"name": "CVE-2021-36222",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36222"
},
{
"name": "CVE-2022-23960",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23960"
},
{
"name": "CVE-2022-37967",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37967"
},
{
"name": "CVE-2022-3629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3629"
},
{
"name": "CVE-2022-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
},
{
"name": "CVE-2022-37434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37434"
},
{
"name": "CVE-2022-2309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2309"
},
{
"name": "CVE-2022-43680",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43680"
},
{
"name": "CVE-2022-29824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29824"
},
{
"name": "CVE-2022-23308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23308"
},
{
"name": "CVE-2022-35737",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35737"
},
{
"name": "CVE-2022-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40303"
},
{
"name": "CVE-2022-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40304"
},
{
"name": "CVE-2022-42898",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42898"
},
{
"name": "CVE-2022-3633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3633"
},
{
"name": "CVE-2022-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
},
{
"name": "CVE-2022-32205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32205"
},
{
"name": "CVE-2022-32206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32206"
},
{
"name": "CVE-2018-25032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
},
{
"name": "CVE-2022-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3996"
},
{
"name": "CVE-2022-3903",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3903"
},
{
"name": "CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"name": "CVE-2022-26878",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26878"
},
{
"name": "CVE-2021-20266",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20266"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2022-1974",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1974"
},
{
"name": "CVE-2021-3521",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3521"
},
{
"name": "CVE-2022-27774",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27774"
},
{
"name": "CVE-2022-27775",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27775"
},
{
"name": "CVE-2022-22576",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22576"
},
{
"name": "CVE-2022-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27776"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2022-2097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2097"
},
{
"name": "CVE-2022-20154",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20154"
},
{
"name": "CVE-2017-7500",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7500"
},
{
"name": "CVE-2021-33574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33574"
},
{
"name": "CVE-2021-36690",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36690"
},
{
"name": "CVE-2021-37750",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37750"
},
{
"name": "CVE-2021-3999",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3999"
},
{
"name": "CVE-2022-23218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23218"
},
{
"name": "CVE-2022-23219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23219"
},
{
"name": "CVE-2022-27782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
},
{
"name": "CVE-2022-32208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32208"
},
{
"name": "CVE-2022-27781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27781"
},
{
"name": "CVE-2022-32207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32207"
},
{
"name": "CVE-2022-3358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3358"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2022-29458",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29458"
},
{
"name": "CVE-2021-39537",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39537"
},
{
"name": "CVE-2022-32221",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32221"
},
{
"name": "CVE-2022-42916",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42916"
},
{
"name": "CVE-2022-35252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35252"
},
{
"name": "CVE-2022-42915",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42915"
},
{
"name": "CVE-2022-43551",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43551"
},
{
"name": "CVE-2022-43552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43552"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2022-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4203"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2022-27672",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27672"
},
{
"name": "CVE-2023-0045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0045"
},
{
"name": "CVE-2023-23915",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23915"
},
{
"name": "CVE-2023-23914",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23914"
},
{
"name": "CVE-2023-23916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23916"
},
{
"name": "CVE-2022-1304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1304"
},
{
"name": "CVE-2023-24329",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24329"
},
{
"name": "CVE-2023-1118",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1118"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2023-1838",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1838"
},
{
"name": "CVE-2023-28410",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28410"
},
{
"name": "CVE-2023-29469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29469"
},
{
"name": "CVE-2023-28484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28484"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2023-27535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27535"
},
{
"name": "CVE-2022-27779",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27779"
},
{
"name": "CVE-2023-27533",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27533"
},
{
"name": "CVE-2023-27538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27538"
},
{
"name": "CVE-2023-27534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27534"
},
{
"name": "CVE-2023-27536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27536"
},
{
"name": "CVE-2022-27780",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27780"
},
{
"name": "CVE-2022-30115",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30115"
},
{
"name": "CVE-2023-1380",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1380"
},
{
"name": "CVE-2020-1752",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1752"
},
{
"name": "CVE-2021-35942",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35942"
},
{
"name": "CVE-2021-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38604"
},
{
"name": "CVE-2020-29562",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29562"
},
{
"name": "CVE-2021-27645",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27645"
},
{
"name": "CVE-2022-3534",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3534"
},
{
"name": "CVE-2023-2156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2156"
},
{
"name": "CVE-2023-3006",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3006"
},
{
"name": "CVE-2023-1255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1255"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2022-46908",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46908"
},
{
"name": "CVE-2021-31239",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31239"
},
{
"name": "CVE-2023-28320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28320"
},
{
"name": "CVE-2023-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28321"
},
{
"name": "CVE-2023-2975",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2975"
},
{
"name": "CVE-2022-4899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4899"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2023-28319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28319"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2023-4387",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4387"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2023-38545",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38545"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2023-45853",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45853"
},
{
"name": "CVE-2023-31085",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31085"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2023-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40217"
},
{
"name": "CVE-2020-22218",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22218"
},
{
"name": "CVE-2023-2603",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2603"
},
{
"name": "CVE-2023-2602",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2602"
},
{
"name": "CVE-2023-4813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4813"
},
{
"name": "CVE-2022-0563",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0563"
},
{
"name": "CVE-2023-4039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4039"
},
{
"name": "CVE-2023-5156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5156"
},
{
"name": "CVE-2023-29491",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29491"
},
{
"name": "CVE-2023-39615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39615"
},
{
"name": "CVE-2021-37600",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37600"
},
{
"name": "CVE-2021-33294",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33294"
},
{
"name": "CVE-2021-43618",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43618"
},
{
"name": "CVE-2023-45322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45322"
},
{
"name": "CVE-2019-17498",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17498"
},
{
"name": "CVE-2013-4235",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4235"
},
{
"name": "CVE-2023-29383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2023-36054",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36054"
},
{
"name": "CVE-2023-7104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7104"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2023-52467",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52467"
},
{
"name": "CVE-2023-52451",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52451"
},
{
"name": "CVE-2023-52445",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52445"
},
{
"name": "CVE-2024-26598",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26598"
},
{
"name": "CVE-2023-52462",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52462"
},
{
"name": "CVE-2023-52469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52469"
},
{
"name": "CVE-2023-52470",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52470"
},
{
"name": "CVE-2023-52464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52464"
},
{
"name": "CVE-2023-52475",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52475"
},
{
"name": "CVE-2023-52478",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52478"
},
{
"name": "CVE-2024-26603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26603"
},
{
"name": "CVE-2023-52452",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52452"
},
{
"name": "CVE-2023-52532",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52532"
},
{
"name": "CVE-2019-25162",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25162"
},
{
"name": "CVE-2021-46904",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46904"
},
{
"name": "CVE-2024-24855",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24855"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2023-36632",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36632"
},
{
"name": "CVE-2024-28085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28085"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2020-22916",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22916"
},
{
"name": "CVE-2024-26631",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26631"
},
{
"name": "CVE-2017-7501",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7501"
},
{
"name": "CVE-2021-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35939"
},
{
"name": "CVE-2021-35938",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35938"
},
{
"name": "CVE-2021-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35937"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2023-52426",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52426"
},
{
"name": "CVE-2023-52501",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52501"
},
{
"name": "CVE-2023-52519",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52519"
},
{
"name": "CVE-2024-26717",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26717"
},
{
"name": "CVE-2024-26670",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26670"
},
{
"name": "CVE-2023-52477",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52477"
},
{
"name": "CVE-2023-52528",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52528"
},
{
"name": "CVE-2023-52582",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52582"
},
{
"name": "CVE-2021-47098",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47098"
},
{
"name": "CVE-2023-52513",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52513"
},
{
"name": "CVE-2024-22099",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22099"
},
{
"name": "CVE-2021-47097",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47097"
},
{
"name": "CVE-2023-52520",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52520"
},
{
"name": "CVE-2023-7042",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7042"
},
{
"name": "CVE-2023-52523",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52523"
},
{
"name": "CVE-2024-26803",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26803"
},
{
"name": "CVE-2024-24858",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24858"
},
{
"name": "CVE-2024-24857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24857"
},
{
"name": "CVE-2024-26660",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26660"
},
{
"name": "CVE-2024-26760",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26760"
},
{
"name": "CVE-2024-26681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26681"
},
{
"name": "CVE-2024-26815",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26815"
},
{
"name": "CVE-2024-26621",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26621"
},
{
"name": "CVE-2024-26714",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26714"
},
{
"name": "CVE-2024-26761",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26761"
},
{
"name": "CVE-2024-26742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26742"
},
{
"name": "CVE-2021-47020",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47020"
},
{
"name": "CVE-2021-47017",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47017"
},
{
"name": "CVE-2021-46984",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46984"
},
{
"name": "CVE-2021-47071",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47071"
},
{
"name": "CVE-2021-47202",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47202"
},
{
"name": "CVE-2024-26605",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26605"
},
{
"name": "CVE-2024-26989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26989"
},
{
"name": "CVE-2024-27003",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27003"
},
{
"name": "CVE-2024-26987",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26987"
},
{
"name": "CVE-2024-27015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27015"
},
{
"name": "CVE-2024-27014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27014"
},
{
"name": "CVE-2024-26992",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26992"
},
{
"name": "CVE-2023-52468",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52468"
},
{
"name": "CVE-2023-52487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52487"
},
{
"name": "CVE-2024-26618",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26618"
},
{
"name": "CVE-2023-52490",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52490"
},
{
"name": "CVE-2023-52455",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52455"
},
{
"name": "CVE-2023-52472",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52472"
},
{
"name": "CVE-2023-52643",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52643"
},
{
"name": "CVE-2024-26649",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26649"
},
{
"name": "CVE-2023-52473",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52473"
},
{
"name": "CVE-2023-52465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52465"
},
{
"name": "CVE-2007-4559",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4559"
},
{
"name": "CVE-2023-52425",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52425"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2024-27042",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27042"
},
{
"name": "CVE-2021-47197",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47197"
},
{
"name": "CVE-2021-47196",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47196"
},
{
"name": "CVE-2022-48702",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48702"
},
{
"name": "CVE-2022-48701",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48701"
},
{
"name": "CVE-2022-48694",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48694"
},
{
"name": "CVE-2022-48644",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48644"
},
{
"name": "CVE-2021-47217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47217"
},
{
"name": "CVE-2022-48653",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48653"
},
{
"name": "CVE-2021-47214",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47214"
},
{
"name": "CVE-2022-48672",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48672"
},
{
"name": "CVE-2022-48657",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48657"
},
{
"name": "CVE-2022-48652",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48652"
},
{
"name": "CVE-2022-48658",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48658"
},
{
"name": "CVE-2021-47210",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47210"
},
{
"name": "CVE-2022-48662",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48662"
},
{
"name": "CVE-2022-48639",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48639"
},
{
"name": "CVE-2023-52646",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52646"
},
{
"name": "CVE-2022-48640",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48640"
},
{
"name": "CVE-2024-26933",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26933"
},
{
"name": "CVE-2021-47215",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47215"
},
{
"name": "CVE-2021-47074",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47074"
},
{
"name": "CVE-2021-47041",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47041"
},
{
"name": "CVE-2024-27039",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27039"
},
{
"name": "CVE-2022-48704",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48704"
},
{
"name": "CVE-2022-48675",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48675"
},
{
"name": "CVE-2022-48690",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48690"
},
{
"name": "CVE-2021-47191",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47191"
},
{
"name": "CVE-2022-48637",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48637"
},
{
"name": "CVE-2022-48632",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48632"
},
{
"name": "CVE-2022-48660",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48660"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2025-9231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9231"
},
{
"name": "CVE-2023-52565",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52565"
},
{
"name": "CVE-2024-26892",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26892"
},
{
"name": "CVE-2024-26964",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26964"
},
{
"name": "CVE-2025-9230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9230"
},
{
"name": "CVE-2025-9232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9232"
},
{
"name": "CVE-2021-47227",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47227"
},
{
"name": "CVE-2021-47237",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47237"
},
{
"name": "CVE-2021-47239",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47239"
},
{
"name": "CVE-2021-47250",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47250"
},
{
"name": "CVE-2021-47261",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47261"
},
{
"name": "CVE-2021-47343",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47343"
},
{
"name": "CVE-2021-47360",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47360"
},
{
"name": "CVE-2021-47365",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47365"
},
{
"name": "CVE-2021-47373",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47373"
},
{
"name": "CVE-2021-47393",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47393"
},
{
"name": "CVE-2021-47398",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47398"
},
{
"name": "CVE-2021-47404",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47404"
},
{
"name": "CVE-2021-47420",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47420"
},
{
"name": "CVE-2021-47422",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47422"
},
{
"name": "CVE-2021-47426",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47426"
},
{
"name": "CVE-2021-47428",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47428"
},
{
"name": "CVE-2021-47429",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47429"
},
{
"name": "CVE-2021-47430",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47430"
},
{
"name": "CVE-2021-47438",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47438"
},
{
"name": "CVE-2021-47444",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47444"
},
{
"name": "CVE-2021-47454",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47454"
},
{
"name": "CVE-2021-47457",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47457"
},
{
"name": "CVE-2021-47465",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47465"
},
{
"name": "CVE-2021-47481",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47481"
},
{
"name": "CVE-2021-47483",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47483"
},
{
"name": "CVE-2021-47490",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47490"
},
{
"name": "CVE-2021-47495",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47495"
},
{
"name": "CVE-2021-47497",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47497"
},
{
"name": "CVE-2021-47499",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47499"
},
{
"name": "CVE-2021-47500",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47500"
},
{
"name": "CVE-2021-47505",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47505"
},
{
"name": "CVE-2021-47516",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47516"
},
{
"name": "CVE-2021-47527",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47527"
},
{
"name": "CVE-2021-47536",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47536"
},
{
"name": "CVE-2021-47537",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47537"
},
{
"name": "CVE-2021-47538",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47538"
},
{
"name": "CVE-2021-47550",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47550"
},
{
"name": "CVE-2021-47559",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47559"
},
{
"name": "CVE-2022-48689",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48689"
},
{
"name": "CVE-2022-48691",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48691"
},
{
"name": "CVE-2022-48705",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48705"
},
{
"name": "CVE-2022-48709",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48709"
},
{
"name": "CVE-2022-48710",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48710"
},
{
"name": "CVE-2023-52654",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52654"
},
{
"name": "CVE-2023-52659",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52659"
},
{
"name": "CVE-2023-52661",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52661"
},
{
"name": "CVE-2023-52662",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52662"
},
{
"name": "CVE-2023-52679",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52679"
},
{
"name": "CVE-2023-52686",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52686"
},
{
"name": "CVE-2023-52690",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52690"
},
{
"name": "CVE-2023-52698",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52698"
},
{
"name": "CVE-2023-52702",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52702"
},
{
"name": "CVE-2023-52703",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52703"
},
{
"name": "CVE-2023-52730",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52730"
},
{
"name": "CVE-2023-52731",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52731"
},
{
"name": "CVE-2023-52736",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52736"
},
{
"name": "CVE-2023-52739",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52739"
},
{
"name": "CVE-2023-52740",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52740"
},
{
"name": "CVE-2023-52743",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52743"
},
{
"name": "CVE-2023-52744",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52744"
},
{
"name": "CVE-2023-52747",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52747"
},
{
"name": "CVE-2023-52764",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52764"
},
{
"name": "CVE-2023-52781",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52781"
},
{
"name": "CVE-2023-52788",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52788"
},
{
"name": "CVE-2023-52791",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52791"
},
{
"name": "CVE-2023-52795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52795"
},
{
"name": "CVE-2023-52796",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52796"
},
{
"name": "CVE-2023-52803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52803"
},
{
"name": "CVE-2023-52806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52806"
},
{
"name": "CVE-2023-52814",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52814"
},
{
"name": "CVE-2023-52817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52817"
},
{
"name": "CVE-2023-52818",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52818"
},
{
"name": "CVE-2023-52833",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52833"
},
{
"name": "CVE-2023-52840",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52840"
},
{
"name": "CVE-2023-52851",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52851"
},
{
"name": "CVE-2023-52854",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52854"
},
{
"name": "CVE-2023-52867",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52867"
},
{
"name": "CVE-2023-52877",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52877"
},
{
"name": "CVE-2024-26838",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26838"
},
{
"name": "CVE-2024-35801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35801"
},
{
"name": "CVE-2024-35804",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35804"
},
{
"name": "CVE-2024-35860",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35860"
},
{
"name": "CVE-2024-35872",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35872"
},
{
"name": "CVE-2024-35901",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35901"
},
{
"name": "CVE-2024-35912",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35912"
},
{
"name": "CVE-2024-35952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35952"
},
{
"name": "CVE-2024-35959",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35959"
},
{
"name": "CVE-2024-35963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35963"
},
{
"name": "CVE-2024-35964",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35964"
},
{
"name": "CVE-2024-36012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36012"
},
{
"name": "CVE-2024-36906",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36906"
},
{
"name": "CVE-2024-36918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36918"
},
{
"name": "CVE-2024-36926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36926"
},
{
"name": "CVE-2024-28757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28757"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2023-52663",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52663"
},
{
"name": "CVE-2023-52675",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52675"
},
{
"name": "CVE-2023-52697",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52697"
},
{
"name": "CVE-2024-26611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26611"
},
{
"name": "CVE-2024-26674",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26674"
},
{
"name": "CVE-2024-26899",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26899"
},
{
"name": "CVE-2024-26990",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26990"
},
{
"name": "CVE-2024-27027",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27027"
},
{
"name": "CVE-2024-27031",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27031"
},
{
"name": "CVE-2024-27057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27057"
},
{
"name": "CVE-2024-35795",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35795"
},
{
"name": "CVE-2024-35810",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35810"
},
{
"name": "CVE-2024-35814",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35814"
},
{
"name": "CVE-2024-35824",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35824"
},
{
"name": "CVE-2024-35834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35834"
},
{
"name": "CVE-2024-35836",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35836"
},
{
"name": "CVE-2024-35838",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35838"
},
{
"name": "CVE-2024-35891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35891"
},
{
"name": "CVE-2024-35903",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35903"
},
{
"name": "CVE-2024-35917",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35917"
},
{
"name": "CVE-2024-35927",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35927"
},
{
"name": "CVE-2024-35974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35974"
},
{
"name": "CVE-2024-35981",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35981"
},
{
"name": "CVE-2024-35991",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35991"
},
{
"name": "CVE-2024-36002",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36002"
},
{
"name": "CVE-2024-36011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36011"
},
{
"name": "CVE-2024-36021",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36021"
},
{
"name": "CVE-2024-36891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36891"
},
{
"name": "CVE-2024-36930",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36930"
},
{
"name": "CVE-2024-36936",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36936"
},
{
"name": "CVE-2024-35983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35983"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2024-0397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0397"
},
{
"name": "CVE-2024-4030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4030"
},
{
"name": "CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"name": "CVE-2023-52648",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52648"
},
{
"name": "CVE-2023-52649",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52649"
},
{
"name": "CVE-2024-26953",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26953"
},
{
"name": "CVE-2024-26975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26975"
},
{
"name": "CVE-2024-27026",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27026"
},
{
"name": "CVE-2024-27079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27079"
},
{
"name": "CVE-2024-27390",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27390"
},
{
"name": "CVE-2024-35787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35787"
},
{
"name": "CVE-2024-35827",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35827"
},
{
"name": "CVE-2024-35831",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35831"
},
{
"name": "CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"name": "CVE-2023-52560",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52560"
},
{
"name": "CVE-2023-52813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52813"
},
{
"name": "CVE-2023-52835",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52835"
},
{
"name": "CVE-2023-52881",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52881"
},
{
"name": "CVE-2024-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
},
{
"name": "CVE-2024-25062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25062"
},
{
"name": "CVE-2024-26458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26458"
},
{
"name": "CVE-2024-26461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26461"
},
{
"name": "CVE-2021-47539",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47539"
},
{
"name": "CVE-2021-47572",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47572"
},
{
"name": "CVE-2021-47576",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47576"
},
{
"name": "CVE-2021-47578",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47578"
},
{
"name": "CVE-2021-47601",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47601"
},
{
"name": "CVE-2021-47607",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47607"
},
{
"name": "CVE-2021-47609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47609"
},
{
"name": "CVE-2021-47616",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47616"
},
{
"name": "CVE-2021-47617",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47617"
},
{
"name": "CVE-2021-47620",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47620"
},
{
"name": "CVE-2022-48712",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48712"
},
{
"name": "CVE-2022-48713",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48713"
},
{
"name": "CVE-2022-48714",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48714"
},
{
"name": "CVE-2022-48720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48720"
},
{
"name": "CVE-2022-48724",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48724"
},
{
"name": "CVE-2022-48725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48725"
},
{
"name": "CVE-2022-48727",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48727"
},
{
"name": "CVE-2022-48728",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48728"
},
{
"name": "CVE-2022-48729",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48729"
},
{
"name": "CVE-2022-48732",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48732"
},
{
"name": "CVE-2022-48745",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48745"
},
{
"name": "CVE-2022-48746",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48746"
},
{
"name": "CVE-2022-48752",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48752"
},
{
"name": "CVE-2022-48760",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48760"
},
{
"name": "CVE-2022-48763",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48763"
},
{
"name": "CVE-2022-48767",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48767"
},
{
"name": "CVE-2022-48768",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48768"
},
{
"name": "CVE-2022-48769",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48769"
},
{
"name": "CVE-2022-48770",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48770"
},
{
"name": "CVE-2023-52787",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52787"
},
{
"name": "CVE-2023-52837",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52837"
},
{
"name": "CVE-2023-52845",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52845"
},
{
"name": "CVE-2023-52846",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52846"
},
{
"name": "CVE-2024-35979",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35979"
},
{
"name": "CVE-2024-36477",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36477"
},
{
"name": "CVE-2024-36937",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36937"
},
{
"name": "CVE-2024-36945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36945"
},
{
"name": "CVE-2024-36967",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36967"
},
{
"name": "CVE-2024-36975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36975"
},
{
"name": "CVE-2023-4641",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4641"
},
{
"name": "CVE-2023-50495",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50495"
},
{
"name": "CVE-2024-24859",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24859"
},
{
"name": "CVE-2024-26734",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26734"
},
{
"name": "CVE-2024-26818",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26818"
},
{
"name": "CVE-2024-26831",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26831"
},
{
"name": "CVE-2024-27012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27012"
},
{
"name": "CVE-2024-27017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27017"
},
{
"name": "CVE-2024-35880",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35880"
},
{
"name": "CVE-2024-35892",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35892"
},
{
"name": "CVE-2024-35894",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35894"
},
{
"name": "CVE-2024-35908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35908"
},
{
"name": "CVE-2024-35913",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35913"
},
{
"name": "CVE-2024-35942",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35942"
},
{
"name": "CVE-2024-35957",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35957"
},
{
"name": "CVE-2024-35980",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35980"
},
{
"name": "CVE-2024-39298",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39298"
},
{
"name": "CVE-2024-39493",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39493"
},
{
"name": "CVE-2024-39500",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39500"
},
{
"name": "CVE-2024-40900",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40900"
},
{
"name": "CVE-2024-40903",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40903"
},
{
"name": "CVE-2024-40908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40908"
},
{
"name": "CVE-2024-40913",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40913"
},
{
"name": "CVE-2024-40919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40919"
},
{
"name": "CVE-2024-40924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40924"
},
{
"name": "CVE-2024-40937",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40937"
},
{
"name": "CVE-2024-40940",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40940"
},
{
"name": "CVE-2024-40948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40948"
},
{
"name": "CVE-2024-40956",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40956"
},
{
"name": "CVE-2024-40989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40989"
},
{
"name": "CVE-2024-40994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40994"
},
{
"name": "CVE-2023-52750",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52750"
},
{
"name": "CVE-2023-52782",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52782"
},
{
"name": "CVE-2023-52786",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52786"
},
{
"name": "CVE-2023-52792",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52792"
},
{
"name": "CVE-2023-52794",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52794"
},
{
"name": "CVE-2023-52842",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52842"
},
{
"name": "CVE-2023-52849",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52849"
},
{
"name": "CVE-2023-52866",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52866"
},
{
"name": "CVE-2024-36010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36010"
},
{
"name": "CVE-2024-36882",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36882"
},
{
"name": "CVE-2024-36962",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36962"
},
{
"name": "CVE-2024-36977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36977"
},
{
"name": "CVE-2024-38566",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38566"
},
{
"name": "CVE-2024-38629",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38629"
},
{
"name": "CVE-2024-39291",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39291"
},
{
"name": "CVE-2024-6923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
},
{
"name": "CVE-2024-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3219"
},
{
"name": "CVE-2024-36028",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36028"
},
{
"name": "CVE-2024-36884",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36884"
},
{
"name": "CVE-2024-36920",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36920"
},
{
"name": "CVE-2024-36932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36932"
},
{
"name": "CVE-2024-36956",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36956"
},
{
"name": "CVE-2024-36961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36961"
},
{
"name": "CVE-2024-38561",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38561"
},
{
"name": "CVE-2024-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38604"
},
{
"name": "CVE-2024-38606",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38606"
},
{
"name": "CVE-2021-47579",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47579"
},
{
"name": "CVE-2022-48757",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48757"
},
{
"name": "CVE-2023-52775",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52775"
},
{
"name": "CVE-2023-52885",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52885"
},
{
"name": "CVE-2024-26837",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26837"
},
{
"name": "CVE-2024-27404",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27404"
},
{
"name": "CVE-2024-39479",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39479"
},
{
"name": "CVE-2024-39498",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39498"
},
{
"name": "CVE-2024-40923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40923"
},
{
"name": "CVE-2024-40925",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40925"
},
{
"name": "CVE-2024-6197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6197"
},
{
"name": "CVE-2021-47623",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47623"
},
{
"name": "CVE-2022-48773",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48773"
},
{
"name": "CVE-2022-48778",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48778"
},
{
"name": "CVE-2022-48780",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48780"
},
{
"name": "CVE-2022-48783",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48783"
},
{
"name": "CVE-2022-48784",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48784"
},
{
"name": "CVE-2022-48785",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48785"
},
{
"name": "CVE-2022-48786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48786"
},
{
"name": "CVE-2022-48787",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48787"
},
{
"name": "CVE-2022-48793",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48793"
},
{
"name": "CVE-2022-48796",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48796"
},
{
"name": "CVE-2022-48797",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48797"
},
{
"name": "CVE-2022-48799",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48799"
},
{
"name": "CVE-2022-48800",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48800"
},
{
"name": "CVE-2022-48801",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48801"
},
{
"name": "CVE-2022-48802",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48802"
},
{
"name": "CVE-2022-48804",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48804"
},
{
"name": "CVE-2022-48806",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48806"
},
{
"name": "CVE-2022-48809",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48809"
},
{
"name": "CVE-2022-48810",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48810"
},
{
"name": "CVE-2022-48812",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48812"
},
{
"name": "CVE-2025-58056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58056"
},
{
"name": "CVE-2025-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58057"
},
{
"name": "CVE-2025-10966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10966"
},
{
"name": "CVE-2025-59425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59425"
},
{
"name": "CVE-2022-48813",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48813"
},
{
"name": "CVE-2022-48815",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48815"
},
{
"name": "CVE-2022-48817",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48817"
},
{
"name": "CVE-2022-48818",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48818"
},
{
"name": "CVE-2022-48823",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48823"
},
{
"name": "CVE-2022-48825",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48825"
},
{
"name": "CVE-2022-48830",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48830"
},
{
"name": "CVE-2022-48831",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48831"
},
{
"name": "CVE-2022-48834",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48834"
},
{
"name": "CVE-2022-48835",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48835"
},
{
"name": "CVE-2022-48836",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48836"
},
{
"name": "CVE-2022-48837",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48837"
},
{
"name": "CVE-2022-48839",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48839"
},
{
"name": "CVE-2022-48840",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48840"
},
{
"name": "CVE-2022-48843",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48843"
},
{
"name": "CVE-2022-48850",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48850"
},
{
"name": "CVE-2022-48853",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48853"
},
{
"name": "CVE-2022-48858",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48858"
},
{
"name": "CVE-2022-48861",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48861"
},
{
"name": "CVE-2022-48863",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48863"
},
{
"name": "CVE-2022-48864",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48864"
},
{
"name": "CVE-2022-48866",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48866"
},
{
"name": "CVE-2023-52886",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52886"
},
{
"name": "CVE-2024-41057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41057"
},
{
"name": "CVE-2024-41058",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41058"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2025-12817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12817"
},
{
"name": "CVE-2025-12818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12818"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2019-14844",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14844"
},
{
"name": "CVE-2021-24031",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-24031"
},
{
"name": "CVE-2021-24032",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-24032"
},
{
"name": "CVE-2021-44964",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44964"
},
{
"name": "CVE-2022-28805",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28805"
},
{
"name": "CVE-2022-33099",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33099"
},
{
"name": "CVE-2025-0306",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0306"
},
{
"name": "CVE-2025-52099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52099"
},
{
"name": "CVE-2025-53643",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53643"
},
{
"name": "CVE-2025-59375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59375"
},
{
"name": "CVE-2025-6141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6141"
},
{
"name": "CVE-2025-7709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7709"
},
{
"name": "CVE-2025-9714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9714"
},
{
"name": "CVE-2024-45491",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45491"
},
{
"name": "CVE-2024-45492",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45492"
},
{
"name": "CVE-2024-38632",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38632"
},
{
"name": "CVE-2024-39491",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39491"
},
{
"name": "CVE-2024-40922",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40922"
},
{
"name": "CVE-2024-40930",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40930"
},
{
"name": "CVE-2024-40964",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40964"
},
{
"name": "CVE-2024-40992",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40992"
},
{
"name": "CVE-2024-41003",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41003"
},
{
"name": "CVE-2024-41047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41047"
},
{
"name": "CVE-2024-42085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42085"
},
{
"name": "CVE-2024-42109",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42109"
},
{
"name": "CVE-2024-42240",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42240"
},
{
"name": "CVE-2021-47517",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47517"
},
{
"name": "CVE-2022-48865",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48865"
},
{
"name": "CVE-2022-48875",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48875"
},
{
"name": "CVE-2022-48883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48883"
},
{
"name": "CVE-2022-48886",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48886"
},
{
"name": "CVE-2022-48889",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48889"
},
{
"name": "CVE-2022-48890",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48890"
},
{
"name": "CVE-2022-48896",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48896"
},
{
"name": "CVE-2022-48899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48899"
},
{
"name": "CVE-2022-48912",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48912"
},
{
"name": "CVE-2022-48913",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48913"
},
{
"name": "CVE-2022-48914",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48914"
},
{
"name": "CVE-2022-48915",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48915"
},
{
"name": "CVE-2022-48921",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48921"
},
{
"name": "CVE-2022-48929",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48929"
},
{
"name": "CVE-2022-48931",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48931"
},
{
"name": "CVE-2022-48934",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48934"
},
{
"name": "CVE-2022-48938",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48938"
},
{
"name": "CVE-2022-48939",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48939"
},
{
"name": "CVE-2022-48942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48942"
},
{
"name": "CVE-2023-52859",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52859"
},
{
"name": "CVE-2023-52898",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52898"
},
{
"name": "CVE-2023-52901",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52901"
},
{
"name": "CVE-2023-52905",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52905"
},
{
"name": "CVE-2023-52906",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52906"
},
{
"name": "CVE-2023-52908",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52908"
},
{
"name": "CVE-2023-52909",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52909"
},
{
"name": "CVE-2023-52910",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52910"
},
{
"name": "CVE-2024-26637",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26637"
},
{
"name": "CVE-2024-26682",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26682"
},
{
"name": "CVE-2024-26683",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26683"
},
{
"name": "CVE-2024-36970",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36970"
},
{
"name": "CVE-2024-39486",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39486"
},
{
"name": "CVE-2024-41010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41010"
},
{
"name": "CVE-2024-41032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41032"
},
{
"name": "CVE-2024-41037",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41037"
},
{
"name": "CVE-2024-41038",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41038"
},
{
"name": "CVE-2024-41039",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41039"
},
{
"name": "CVE-2024-41045",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41045"
},
{
"name": "CVE-2024-41056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41056"
},
{
"name": "CVE-2024-41084",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41084"
},
{
"name": "CVE-2024-41094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41094"
},
{
"name": "CVE-2024-42107",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42107"
},
{
"name": "CVE-2024-42125",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42125"
},
{
"name": "CVE-2024-42132",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42132"
},
{
"name": "CVE-2024-42133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42133"
},
{
"name": "CVE-2024-42138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42138"
},
{
"name": "CVE-2024-42139",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42139"
},
{
"name": "CVE-2024-42141",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42141"
},
{
"name": "CVE-2024-42238",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42238"
},
{
"name": "CVE-2024-42239",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42239"
},
{
"name": "CVE-2024-42241",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42241"
},
{
"name": "CVE-2024-42245",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42245"
},
{
"name": "CVE-2024-42268",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42268"
},
{
"name": "CVE-2024-42278",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42278"
},
{
"name": "CVE-2024-42291",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42291"
},
{
"name": "CVE-2024-42315",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42315"
},
{
"name": "CVE-2024-42316",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42316"
},
{
"name": "CVE-2024-43816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43816"
},
{
"name": "CVE-2024-43817",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43817"
},
{
"name": "CVE-2024-43821",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43821"
},
{
"name": "CVE-2024-43826",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43826"
},
{
"name": "CVE-2024-43840",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43840"
},
{
"name": "CVE-2024-43842",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43842"
},
{
"name": "CVE-2024-43873",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43873"
},
{
"name": "CVE-2024-43874",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43874"
},
{
"name": "CVE-2024-7264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
},
{
"name": "CVE-2024-41031",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41031"
},
{
"name": "CVE-2024-42243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42243"
},
{
"name": "CVE-2024-34459",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34459"
},
{
"name": "CVE-2024-8096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
},
{
"name": "CVE-2024-44983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44983"
},
{
"name": "CVE-2024-44986",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44986"
},
{
"name": "CVE-2024-45000",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45000"
},
{
"name": "CVE-2024-45010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45010"
},
{
"name": "CVE-2024-45019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45019"
},
{
"name": "CVE-2024-45022",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45022"
},
{
"name": "CVE-2024-45029",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45029"
},
{
"name": "CVE-2024-46711",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46711"
},
{
"name": "CVE-2024-46784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46784"
},
{
"name": "CVE-2024-46830",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46830"
},
{
"name": "CVE-2022-48944",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48944"
},
{
"name": "CVE-2024-42294",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42294"
},
{
"name": "CVE-2024-43870",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43870"
},
{
"name": "CVE-2024-44967",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44967"
},
{
"name": "CVE-2024-44984",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44984"
},
{
"name": "CVE-2024-45001",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45001"
},
{
"name": "CVE-2024-45005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45005"
},
{
"name": "CVE-2024-45012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45012"
},
{
"name": "CVE-2024-45013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45013"
},
{
"name": "CVE-2024-45017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45017"
},
{
"name": "CVE-2024-45020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45020"
},
{
"name": "CVE-2024-46672",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46672"
},
{
"name": "CVE-2024-46692",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46692"
},
{
"name": "CVE-2024-46706",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46706"
},
{
"name": "CVE-2024-46709",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46709"
},
{
"name": "CVE-2024-46710",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46710"
},
{
"name": "CVE-2024-46767",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46767"
},
{
"name": "CVE-2024-46786",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46786"
},
{
"name": "CVE-2024-46797",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46797"
},
{
"name": "CVE-2024-37370",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37370"
},
{
"name": "CVE-2024-37371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2024-41085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41085"
},
{
"name": "CVE-2024-26721",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26721"
},
{
"name": "CVE-2024-42258",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42258"
},
{
"name": "CVE-2024-45490",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45490"
},
{
"name": "CVE-2024-7592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7592"
},
{
"name": "CVE-2024-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
},
{
"name": "CVE-2025-54121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54121"
},
{
"name": "CVE-2012-2114",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2114"
},
{
"name": "CVE-2021-46937",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46937"
},
{
"name": "CVE-2021-46999",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46999"
},
{
"name": "CVE-2021-47033",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47033"
},
{
"name": "CVE-2021-47079",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47079"
},
{
"name": "CVE-2021-47092",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47092"
},
{
"name": "CVE-2021-47226",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47226"
},
{
"name": "CVE-2021-47251",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47251"
},
{
"name": "CVE-2021-47266",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47266"
},
{
"name": "CVE-2021-47318",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47318"
},
{
"name": "CVE-2021-47325",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47325"
},
{
"name": "CVE-2021-47346",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47346"
},
{
"name": "CVE-2021-47349",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47349"
},
{
"name": "CVE-2021-47519",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47519"
},
{
"name": "CVE-2021-47561",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47561"
},
{
"name": "CVE-2021-47613",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47613"
},
{
"name": "CVE-2022-1247",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1247"
},
{
"name": "CVE-2022-20153",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20153"
},
{
"name": "CVE-2022-48641",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48641"
},
{
"name": "CVE-2022-48643",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48643"
},
{
"name": "CVE-2022-48707",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48707"
},
{
"name": "CVE-2022-48719",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48719"
},
{
"name": "CVE-2022-48781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48781"
},
{
"name": "CVE-2022-48819",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48819"
},
{
"name": "CVE-2022-48832",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48832"
},
{
"name": "CVE-2022-48848",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48848"
},
{
"name": "CVE-2022-48876",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48876"
},
{
"name": "CVE-2022-48963",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48963"
},
{
"name": "CVE-2022-48974",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48974"
},
{
"name": "CVE-2022-48976",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48976"
},
{
"name": "CVE-2022-48984",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48984"
},
{
"name": "CVE-2022-48986",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48986"
},
{
"name": "CVE-2022-49013",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49013"
},
{
"name": "CVE-2022-49018",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49018"
},
{
"name": "CVE-2022-49048",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49048"
},
{
"name": "CVE-2022-49049",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49049"
},
{
"name": "CVE-2022-49052",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49052"
},
{
"name": "CVE-2022-49072",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49072"
},
{
"name": "CVE-2022-49077",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49077"
},
{
"name": "CVE-2022-49094",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49094"
},
{
"name": "CVE-2022-49152",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49152"
},
{
"name": "CVE-2022-49198",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49198"
},
{
"name": "CVE-2022-49229",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49229"
},
{
"name": "CVE-2022-49231",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49231"
},
{
"name": "CVE-2022-49334",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49334"
},
{
"name": "CVE-2022-49340",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49340"
},
{
"name": "CVE-2022-49374",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49374"
},
{
"name": "CVE-2022-49401",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49401"
},
{
"name": "CVE-2022-49403",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49403"
},
{
"name": "CVE-2022-49450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49450"
},
{
"name": "CVE-2022-49554",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49554"
},
{
"name": "CVE-2022-49557",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49557"
},
{
"name": "CVE-2022-49567",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49567"
},
{
"name": "CVE-2022-49571",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49571"
},
{
"name": "CVE-2022-49572",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49572"
},
{
"name": "CVE-2022-49573",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49573"
},
{
"name": "CVE-2022-49574",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49574"
},
{
"name": "CVE-2022-49575",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49575"
},
{
"name": "CVE-2022-49577",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49577"
},
{
"name": "CVE-2022-49580",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49580"
},
{
"name": "CVE-2022-49585",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49585"
},
{
"name": "CVE-2022-49586",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49586"
},
{
"name": "CVE-2022-49587",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49587"
},
{
"name": "CVE-2022-49593",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49593"
},
{
"name": "CVE-2022-49594",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49594"
},
{
"name": "CVE-2022-49595",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49595"
},
{
"name": "CVE-2022-49596",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49596"
},
{
"name": "CVE-2022-49597",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49597"
},
{
"name": "CVE-2022-49598",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49598"
},
{
"name": "CVE-2022-49599",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49599"
},
{
"name": "CVE-2022-49600",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49600"
},
{
"name": "CVE-2022-49601",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49601"
},
{
"name": "CVE-2022-49602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49602"
},
{
"name": "CVE-2022-49604",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49604"
},
{
"name": "CVE-2022-49612",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49612"
},
{
"name": "CVE-2022-49629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49629"
},
{
"name": "CVE-2022-49633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49633"
},
{
"name": "CVE-2022-49637",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49637"
},
{
"name": "CVE-2022-49639",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49639"
},
{
"name": "CVE-2022-49659",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49659"
},
{
"name": "CVE-2022-49662",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49662"
},
{
"name": "CVE-2022-49691",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49691"
},
{
"name": "CVE-2022-49744",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49744"
},
{
"name": "CVE-2022-49747",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49747"
},
{
"name": "CVE-2022-49752",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49752"
},
{
"name": "CVE-2022-49754",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49754"
},
{
"name": "CVE-2022-49760",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49760"
},
{
"name": "CVE-2023-31082",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31082"
},
{
"name": "CVE-2023-52516",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52516"
},
{
"name": "CVE-2023-52568",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52568"
},
{
"name": "CVE-2023-52570",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52570"
},
{
"name": "CVE-2023-52689",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52689"
},
{
"name": "CVE-2023-52704",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52704"
},
{
"name": "CVE-2023-52706",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52706"
},
{
"name": "CVE-2023-52828",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52828"
},
{
"name": "CVE-2023-52902",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52902"
},
{
"name": "CVE-2023-52932",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52932"
},
{
"name": "CVE-2023-52934",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52934"
},
{
"name": "CVE-2023-52940",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52940"
},
{
"name": "CVE-2023-52942",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52942"
},
{
"name": "CVE-2023-52977",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52977"
},
{
"name": "CVE-2023-52985",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52985"
},
{
"name": "CVE-2023-52987",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52987"
},
{
"name": "CVE-2023-52991",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52991"
},
{
"name": "CVE-2023-53004",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53004"
},
{
"name": "CVE-2023-53017",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53017"
},
{
"name": "CVE-2024-23196",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23196"
},
{
"name": "CVE-2024-26678",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26678"
},
{
"name": "CVE-2024-26725",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26725"
},
{
"name": "CVE-2024-26746",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26746"
},
{
"name": "CVE-2024-26918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26918"
},
{
"name": "CVE-2024-27023",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27023"
},
{
"name": "CVE-2024-40907",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40907"
},
{
"name": "CVE-2024-43896",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43896"
},
{
"name": "CVE-2024-46748",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46748"
},
{
"name": "CVE-2024-46862",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46862"
},
{
"name": "CVE-2024-53073",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53073"
},
{
"name": "CVE-2024-53225",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53225"
},
{
"name": "CVE-2024-56668",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56668"
},
{
"name": "CVE-2024-57852",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57852"
},
{
"name": "CVE-2024-57914",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57914"
},
{
"name": "CVE-2024-57985",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57985"
},
{
"name": "CVE-2024-57989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57989"
},
{
"name": "CVE-2024-58064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58064"
},
{
"name": "CVE-2024-58075",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58075"
},
{
"name": "CVE-2024-58084",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58084"
},
{
"name": "CVE-2025-21709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21709"
},
{
"name": "CVE-2025-21807",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21807"
},
{
"name": "CVE-2025-21817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21817"
},
{
"name": "CVE-2025-21827",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21827"
},
{
"name": "CVE-2025-21851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21851"
},
{
"name": "CVE-2025-21874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21874"
},
{
"name": "CVE-2025-21907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21907"
},
{
"name": "CVE-2025-21921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21921"
},
{
"name": "CVE-2025-24357",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24357"
},
{
"name": "CVE-2025-25183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25183"
},
{
"name": "CVE-2025-29770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29770"
},
{
"name": "CVE-2025-30165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30165"
},
{
"name": "CVE-2025-30202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30202"
},
{
"name": "CVE-2025-32381",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32381"
},
{
"name": "CVE-2025-32444",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32444"
},
{
"name": "CVE-2025-46570",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46570"
},
{
"name": "CVE-2025-47277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47277"
},
{
"name": "CVE-2025-48887",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48887"
},
{
"name": "CVE-2025-48956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48956"
},
{
"name": "CVE-2025-57809",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-57809"
},
{
"name": "CVE-2025-62372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62372"
},
{
"name": "CVE-2025-62426",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62426"
},
{
"name": "CVE-2025-65106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-65106"
},
{
"name": "CVE-2024-9681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
},
{
"name": "CVE-2024-11168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
},
{
"name": "CVE-2022-48879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48879"
},
{
"name": "CVE-2022-48946",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48946"
},
{
"name": "CVE-2022-48951",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48951"
},
{
"name": "CVE-2022-48953",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48953"
},
{
"name": "CVE-2022-48969",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48969"
},
{
"name": "CVE-2022-48971",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48971"
},
{
"name": "CVE-2022-48972",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48972"
},
{
"name": "CVE-2022-48978",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48978"
},
{
"name": "CVE-2022-48981",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48981"
},
{
"name": "CVE-2022-48985",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48985"
},
{
"name": "CVE-2022-48987",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48987"
},
{
"name": "CVE-2022-48988",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48988"
},
{
"name": "CVE-2022-48992",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48992"
},
{
"name": "CVE-2022-48994",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48994"
},
{
"name": "CVE-2022-48997",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48997"
},
{
"name": "CVE-2022-49005",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49005"
},
{
"name": "CVE-2022-49006",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49006"
},
{
"name": "CVE-2022-49011",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49011"
},
{
"name": "CVE-2022-49012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49012"
},
{
"name": "CVE-2022-49014",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49014"
},
{
"name": "CVE-2022-49015",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49015"
},
{
"name": "CVE-2022-49017",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49017"
},
{
"name": "CVE-2022-49021",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49021"
},
{
"name": "CVE-2022-49022",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49022"
},
{
"name": "CVE-2022-49024",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49024"
},
{
"name": "CVE-2022-49027",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49027"
},
{
"name": "CVE-2022-49028",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49028"
},
{
"name": "CVE-2022-49029",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49029"
},
{
"name": "CVE-2024-44932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44932"
},
{
"name": "CVE-2024-44964",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44964"
},
{
"name": "CVE-2024-46766",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46766"
},
{
"name": "CVE-2024-46825",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46825"
},
{
"name": "CVE-2024-46864",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46864"
},
{
"name": "CVE-2024-43869",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43869"
},
{
"name": "CVE-2024-47672",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47672"
},
{
"name": "CVE-2024-47675",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47675"
},
{
"name": "CVE-2024-47682",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47682"
},
{
"name": "CVE-2024-47687",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47687"
},
{
"name": "CVE-2024-47696",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47696"
},
{
"name": "CVE-2024-47702",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47702"
},
{
"name": "CVE-2024-47715",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47715"
},
{
"name": "CVE-2024-47719",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47719"
},
{
"name": "CVE-2024-47727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47727"
},
{
"name": "CVE-2024-49855",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49855"
},
{
"name": "CVE-2024-49862",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49862"
},
{
"name": "CVE-2024-49864",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49864"
},
{
"name": "CVE-2024-49866",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49866"
},
{
"name": "CVE-2024-49870",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49870"
},
{
"name": "CVE-2024-49886",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49886"
},
{
"name": "CVE-2024-49946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49946"
},
{
"name": "CVE-2024-49953",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49953"
},
{
"name": "CVE-2024-50000",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50000"
},
{
"name": "CVE-2024-50019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50019"
},
{
"name": "CVE-2024-50020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50020"
},
{
"name": "CVE-2024-50021",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50021"
},
{
"name": "CVE-2024-50022",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50022"
},
{
"name": "CVE-2024-50023",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50023"
},
{
"name": "CVE-2024-50027",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50027"
},
{
"name": "CVE-2024-50041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50041"
},
{
"name": "CVE-2024-50042",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50042"
},
{
"name": "CVE-2024-50060",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50060"
},
{
"name": "CVE-2024-50064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50064"
},
{
"name": "CVE-2024-50074",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50074"
},
{
"name": "CVE-2024-50075",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50075"
},
{
"name": "CVE-2024-50076",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50076"
},
{
"name": "CVE-2024-50077",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50077"
},
{
"name": "CVE-2024-50078",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50078"
},
{
"name": "CVE-2024-50081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50081"
},
{
"name": "CVE-2024-46824",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46824"
},
{
"name": "CVE-2024-50126",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50126"
},
{
"name": "CVE-2024-50215",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50215"
},
{
"name": "CVE-2024-50235",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50235"
},
{
"name": "CVE-2024-50250",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50250"
},
{
"name": "CVE-2024-50252",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50252"
},
{
"name": "CVE-2024-50255",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50255"
},
{
"name": "CVE-2024-50259",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50259"
},
{
"name": "CVE-2024-50261",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50261"
},
{
"name": "CVE-2024-50271",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50271"
},
{
"name": "CVE-2024-53042",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53042"
},
{
"name": "CVE-2024-53055",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53055"
},
{
"name": "CVE-2024-53070",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53070"
},
{
"name": "CVE-2024-53072",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53072"
},
{
"name": "CVE-2024-53082",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53082"
},
{
"name": "CVE-2024-50226",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50226"
},
{
"name": "CVE-2024-11053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
},
{
"name": "CVE-2024-44994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44994"
},
{
"name": "CVE-2024-50110",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50110"
},
{
"name": "CVE-2024-42317",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42317"
},
{
"name": "CVE-2024-43820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43820"
},
{
"name": "CVE-2024-43888",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43888"
},
{
"name": "CVE-2024-43910",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43910"
},
{
"name": "CVE-2024-44975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44975"
},
{
"name": "CVE-2024-44996",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44996"
},
{
"name": "CVE-2024-45027",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45027"
},
{
"name": "CVE-2024-46697",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46697"
},
{
"name": "CVE-2024-46698",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46698"
},
{
"name": "CVE-2024-46788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46788"
},
{
"name": "CVE-2024-46793",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46793"
},
{
"name": "CVE-2024-46845",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46845"
},
{
"name": "CVE-2024-47734",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47734"
},
{
"name": "CVE-2024-49856",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49856"
},
{
"name": "CVE-2024-49977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49977"
},
{
"name": "CVE-2024-50093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50093"
},
{
"name": "CVE-2024-50186",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50186"
},
{
"name": "CVE-2024-50189",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50189"
},
{
"name": "CVE-2022-48982",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48982"
},
{
"name": "CVE-2022-48983",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48983"
},
{
"name": "CVE-2022-48989",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48989"
},
{
"name": "CVE-2023-52778",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52778"
},
{
"name": "CVE-2024-49976",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49976"
},
{
"name": "CVE-2024-50101",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50101"
},
{
"name": "CVE-2024-50102",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50102"
},
{
"name": "CVE-2024-50121",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50121"
},
{
"name": "CVE-2024-50124",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50124"
},
{
"name": "CVE-2024-50125",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50125"
},
{
"name": "CVE-2024-50128",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50128"
},
{
"name": "CVE-2024-50136",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50136"
},
{
"name": "CVE-2024-50139",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50139"
},
{
"name": "CVE-2024-50141",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50141"
},
{
"name": "CVE-2024-50145",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50145"
},
{
"name": "CVE-2024-50146",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50146"
},
{
"name": "CVE-2024-50147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50147"
},
{
"name": "CVE-2024-50153",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50153"
},
{
"name": "CVE-2024-50155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50155"
},
{
"name": "CVE-2024-50157",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50157"
},
{
"name": "CVE-2024-50158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50158"
},
{
"name": "CVE-2024-50160",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50160"
},
{
"name": "CVE-2024-50169",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50169"
},
{
"name": "CVE-2024-50172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50172"
},
{
"name": "CVE-2024-50182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50182"
},
{
"name": "CVE-2024-50200",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50200"
},
{
"name": "CVE-2024-50216",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50216"
},
{
"name": "CVE-2024-50274",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50274"
},
{
"name": "CVE-2024-50275",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50275"
},
{
"name": "CVE-2024-53045",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53045"
},
{
"name": "CVE-2024-53048",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53048"
},
{
"name": "CVE-2024-53074",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53074"
},
{
"name": "CVE-2024-53085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53085"
},
{
"name": "CVE-2024-53110",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53110"
},
{
"name": "CVE-2024-50162",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50162"
},
{
"name": "CVE-2024-50163",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50163"
},
{
"name": "CVE-2024-53097",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53097"
},
{
"name": "CVE-2024-53113",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53113"
},
{
"name": "CVE-2024-53120",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53120"
},
{
"name": "CVE-2024-53123",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53123"
},
{
"name": "CVE-2024-53136",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53136"
},
{
"name": "CVE-2024-53064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53064"
},
{
"name": "CVE-2024-53105",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53105"
},
{
"name": "CVE-2024-53117",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53117"
},
{
"name": "CVE-2024-53118",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53118"
},
{
"name": "CVE-2024-53134",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53134"
},
{
"name": "CVE-2024-53151",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53151"
},
{
"name": "CVE-2024-53160",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53160"
},
{
"name": "CVE-2024-53166",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53166"
},
{
"name": "CVE-2024-53169",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53169"
},
{
"name": "CVE-2024-53202",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53202"
},
{
"name": "CVE-2024-53206",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53206"
},
{
"name": "CVE-2024-53207",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53207"
},
{
"name": "CVE-2024-53208",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53208"
},
{
"name": "CVE-2024-53213",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53213"
},
{
"name": "CVE-2024-53215",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53215"
},
{
"name": "CVE-2024-53222",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53222"
},
{
"name": "CVE-2024-53229",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53229"
},
{
"name": "CVE-2024-56549",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56549"
},
{
"name": "CVE-2024-56667",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56667"
},
{
"name": "CVE-2024-56752",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56752"
},
{
"name": "CVE-2024-48873",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-48873"
},
{
"name": "CVE-2024-49951",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49951"
},
{
"name": "CVE-2024-53091",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53091"
},
{
"name": "CVE-2024-53170",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53170"
},
{
"name": "CVE-2024-53175",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53175"
},
{
"name": "CVE-2024-53185",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53185"
},
{
"name": "CVE-2024-53230",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53230"
},
{
"name": "CVE-2024-53231",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53231"
},
{
"name": "CVE-2024-53232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53232"
},
{
"name": "CVE-2024-53236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53236"
},
{
"name": "CVE-2024-55881",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-55881"
},
{
"name": "CVE-2024-56372",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56372"
},
{
"name": "CVE-2025-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
},
{
"name": "CVE-2024-53238",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53238"
},
{
"name": "CVE-2024-56617",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56617"
},
{
"name": "CVE-2024-56625",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56625"
},
{
"name": "CVE-2024-56632",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56632"
},
{
"name": "CVE-2024-56654",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56654"
},
{
"name": "CVE-2024-56663",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56663"
},
{
"name": "CVE-2024-56675",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56675"
},
{
"name": "CVE-2024-56708",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56708"
},
{
"name": "CVE-2024-56709",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56709"
},
{
"name": "CVE-2024-56729",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56729"
},
{
"name": "CVE-2024-56745",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56745"
},
{
"name": "CVE-2024-56760",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56760"
},
{
"name": "CVE-2024-56765",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56765"
},
{
"name": "CVE-2024-57793",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57793"
},
{
"name": "CVE-2024-57804",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57804"
},
{
"name": "CVE-2024-57932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57932"
},
{
"name": "CVE-2024-57933",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57933"
},
{
"name": "CVE-2024-57936",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57936"
},
{
"name": "CVE-2025-21645",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21645"
},
{
"name": "CVE-2025-21649",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21649"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2025-0725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
},
{
"name": "CVE-2024-46820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46820"
},
{
"name": "CVE-2024-50602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50602"
},
{
"name": "CVE-2024-53047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53047"
},
{
"name": "CVE-2024-56679",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56679"
},
{
"name": "CVE-2024-56707",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56707"
},
{
"name": "CVE-2024-56725",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56725"
},
{
"name": "CVE-2024-56726",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56726"
},
{
"name": "CVE-2024-56727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56727"
},
{
"name": "CVE-2024-57882",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57882"
},
{
"name": "CVE-2024-57917",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57917"
},
{
"name": "CVE-2025-21663",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21663"
},
{
"name": "CVE-2025-21670",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21670"
},
{
"name": "CVE-2024-50164",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50164"
},
{
"name": "CVE-2025-21647",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21647"
},
{
"name": "CVE-2025-21668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21668"
},
{
"name": "CVE-2025-21671",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21671"
},
{
"name": "CVE-2025-21681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21681"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2021-47222",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47222"
},
{
"name": "CVE-2021-47223",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47223"
},
{
"name": "CVE-2025-21673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21673"
},
{
"name": "CVE-2024-47700",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47700"
},
{
"name": "CVE-2024-49880",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49880"
},
{
"name": "CVE-2024-49885",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49885"
},
{
"name": "CVE-2024-49999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49999"
},
{
"name": "CVE-2024-50029",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50029"
},
{
"name": "CVE-2024-50107",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50107"
},
{
"name": "CVE-2024-50109",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50109"
},
{
"name": "CVE-2024-50114",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50114"
},
{
"name": "CVE-2024-50120",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50120"
},
{
"name": "CVE-2024-50152",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50152"
},
{
"name": "CVE-2024-50165",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50165"
},
{
"name": "CVE-2024-50197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50197"
},
{
"name": "CVE-2024-50207",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50207"
},
{
"name": "CVE-2024-50223",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50223"
},
{
"name": "CVE-2024-50294",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50294"
},
{
"name": "CVE-2024-50303",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50303"
},
{
"name": "CVE-2024-53044",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53044"
},
{
"name": "CVE-2024-53109",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53109"
},
{
"name": "CVE-2024-53167",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53167"
},
{
"name": "CVE-2024-53176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53176"
},
{
"name": "CVE-2024-53178",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53178"
},
{
"name": "CVE-2024-53189",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53189"
},
{
"name": "CVE-2024-56535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56535"
},
{
"name": "CVE-2024-56545",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56545"
},
{
"name": "CVE-2024-56696",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56696"
},
{
"name": "CVE-2024-56702",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56702"
},
{
"name": "CVE-2024-56742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56742"
},
{
"name": "CVE-2025-1795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1795"
},
{
"name": "CVE-2024-56783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56783"
},
{
"name": "CVE-2025-21694",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21694"
},
{
"name": "CVE-2022-49080",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49080"
},
{
"name": "CVE-2022-49089",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49089"
},
{
"name": "CVE-2024-57994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57994"
},
{
"name": "CVE-2025-21705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21705"
},
{
"name": "CVE-2025-21716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21716"
},
{
"name": "CVE-2025-21724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21724"
},
{
"name": "CVE-2025-21725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21725"
},
{
"name": "CVE-2025-21790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21790"
},
{
"name": "CVE-2025-21795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21795"
},
{
"name": "CVE-2022-49043",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49043"
},
{
"name": "CVE-2024-45336",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45336"
},
{
"name": "CVE-2024-45341",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45341"
},
{
"name": "CVE-2025-22866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22866"
},
{
"name": "CVE-2021-47648",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47648"
},
{
"name": "CVE-2021-47649",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47649"
},
{
"name": "CVE-2021-47650",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47650"
},
{
"name": "CVE-2021-47659",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47659"
},
{
"name": "CVE-2022-49058",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49058"
},
{
"name": "CVE-2022-49061",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49061"
},
{
"name": "CVE-2022-49065",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49065"
},
{
"name": "CVE-2022-49066",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49066"
},
{
"name": "CVE-2022-49074",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49074"
},
{
"name": "CVE-2022-49086",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49086"
},
{
"name": "CVE-2022-49090",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49090"
},
{
"name": "CVE-2022-49092",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49092"
},
{
"name": "CVE-2022-49097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49097"
},
{
"name": "CVE-2022-49100",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49100"
},
{
"name": "CVE-2022-49103",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49103"
},
{
"name": "CVE-2022-49107",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49107"
},
{
"name": "CVE-2022-49118",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49118"
},
{
"name": "CVE-2022-49122",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49122"
},
{
"name": "CVE-2022-49130",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49130"
},
{
"name": "CVE-2022-49145",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49145"
},
{
"name": "CVE-2022-49147",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49147"
},
{
"name": "CVE-2022-49148",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49148"
},
{
"name": "CVE-2022-49153",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49153"
},
{
"name": "CVE-2022-49154",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49154"
},
{
"name": "CVE-2022-49155",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49155"
},
{
"name": "CVE-2022-49156",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49156"
},
{
"name": "CVE-2022-49159",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49159"
},
{
"name": "CVE-2022-49174",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49174"
},
{
"name": "CVE-2022-49175",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49175"
},
{
"name": "CVE-2022-49180",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49180"
},
{
"name": "CVE-2022-49187",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49187"
},
{
"name": "CVE-2022-49188",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49188"
},
{
"name": "CVE-2022-49206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49206"
},
{
"name": "CVE-2022-49208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49208"
},
{
"name": "CVE-2022-49216",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49216"
},
{
"name": "CVE-2022-49227",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49227"
},
{
"name": "CVE-2022-49257",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49257"
},
{
"name": "CVE-2022-49259",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49259"
},
{
"name": "CVE-2022-49262",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49262"
},
{
"name": "CVE-2022-49263",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49263"
},
{
"name": "CVE-2022-49264",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49264"
},
{
"name": "CVE-2022-49266",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49266"
},
{
"name": "CVE-2022-49268",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49268"
},
{
"name": "CVE-2022-49269",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49269"
},
{
"name": "CVE-2022-49272",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49272"
},
{
"name": "CVE-2022-49273",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49273"
},
{
"name": "CVE-2022-49279",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49279"
},
{
"name": "CVE-2022-49286",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49286"
},
{
"name": "CVE-2022-49290",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49290"
},
{
"name": "CVE-2022-49297",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49297"
},
{
"name": "CVE-2022-49307",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49307"
},
{
"name": "CVE-2022-49308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49308"
},
{
"name": "CVE-2022-49321",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49321"
},
{
"name": "CVE-2022-49322",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49322"
},
{
"name": "CVE-2022-49323",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49323"
},
{
"name": "CVE-2022-49339",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49339"
},
{
"name": "CVE-2022-49341",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49341"
},
{
"name": "CVE-2022-49343",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49343"
},
{
"name": "CVE-2022-49345",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49345"
},
{
"name": "CVE-2022-49350",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49350"
},
{
"name": "CVE-2022-49352",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49352"
},
{
"name": "CVE-2022-49356",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49356"
},
{
"name": "CVE-2022-49357",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49357"
},
{
"name": "CVE-2022-49376",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49376"
},
{
"name": "CVE-2022-49378",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49378"
},
{
"name": "CVE-2022-49379",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49379"
},
{
"name": "CVE-2022-49384",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49384"
},
{
"name": "CVE-2022-49394",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49394"
},
{
"name": "CVE-2022-49400",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49400"
},
{
"name": "CVE-2022-49402",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49402"
},
{
"name": "CVE-2022-49404",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49404"
},
{
"name": "CVE-2022-49407",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49407"
},
{
"name": "CVE-2022-49409",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49409"
},
{
"name": "CVE-2022-49422",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49422"
},
{
"name": "CVE-2022-49432",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49432"
},
{
"name": "CVE-2022-49433",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49433"
},
{
"name": "CVE-2022-49434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49434"
},
{
"name": "CVE-2022-49441",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49441"
},
{
"name": "CVE-2022-49447",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49447"
},
{
"name": "CVE-2022-49455",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49455"
},
{
"name": "CVE-2022-49468",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49468"
},
{
"name": "CVE-2022-49472",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49472"
},
{
"name": "CVE-2022-49475",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49475"
},
{
"name": "CVE-2022-49481",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49481"
},
{
"name": "CVE-2022-49486",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49486"
},
{
"name": "CVE-2022-49492",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49492"
},
{
"name": "CVE-2022-49498",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49498"
},
{
"name": "CVE-2022-49503",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49503"
},
{
"name": "CVE-2022-49508",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49508"
},
{
"name": "CVE-2022-49515",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49515"
},
{
"name": "CVE-2022-49519",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49519"
},
{
"name": "CVE-2022-49520",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49520"
},
{
"name": "CVE-2022-49521",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49521"
},
{
"name": "CVE-2022-49523",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49523"
},
{
"name": "CVE-2022-49526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49526"
},
{
"name": "CVE-2022-49532",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49532"
},
{
"name": "CVE-2022-49545",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49545"
},
{
"name": "CVE-2022-49559",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49559"
},
{
"name": "CVE-2022-49581",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49581"
},
{
"name": "CVE-2022-49583",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49583"
},
{
"name": "CVE-2022-49584",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49584"
},
{
"name": "CVE-2022-49592",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49592"
},
{
"name": "CVE-2022-49603",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49603"
},
{
"name": "CVE-2022-49605",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49605"
},
{
"name": "CVE-2022-49606",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49606"
},
{
"name": "CVE-2022-49607",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49607"
},
{
"name": "CVE-2022-49611",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49611"
},
{
"name": "CVE-2022-49613",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49613"
},
{
"name": "CVE-2022-49625",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49625"
},
{
"name": "CVE-2022-49627",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49627"
},
{
"name": "CVE-2022-49631",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49631"
},
{
"name": "CVE-2022-49634",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49634"
},
{
"name": "CVE-2022-49640",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49640"
},
{
"name": "CVE-2022-49641",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49641"
},
{
"name": "CVE-2022-49642",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49642"
},
{
"name": "CVE-2022-49643",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49643"
},
{
"name": "CVE-2022-49646",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49646"
},
{
"name": "CVE-2022-49648",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49648"
},
{
"name": "CVE-2022-49653",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49653"
},
{
"name": "CVE-2022-49656",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49656"
},
{
"name": "CVE-2022-49657",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49657"
},
{
"name": "CVE-2022-49663",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49663"
},
{
"name": "CVE-2022-49670",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49670"
},
{
"name": "CVE-2022-49671",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49671"
},
{
"name": "CVE-2022-49672",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49672"
},
{
"name": "CVE-2022-49673",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49673"
},
{
"name": "CVE-2022-49674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49674"
},
{
"name": "CVE-2022-49675",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49675"
},
{
"name": "CVE-2022-49679",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49679"
},
{
"name": "CVE-2022-49688",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49688"
},
{
"name": "CVE-2022-49699",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49699"
},
{
"name": "CVE-2022-49707",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49707"
},
{
"name": "CVE-2022-49708",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49708"
},
{
"name": "CVE-2022-49710",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49710"
},
{
"name": "CVE-2022-49716",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49716"
},
{
"name": "CVE-2022-49721",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49721"
},
{
"name": "CVE-2022-49723",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49723"
},
{
"name": "CVE-2022-49726",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49726"
},
{
"name": "CVE-2022-49731",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49731"
},
{
"name": "CVE-2024-48876",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-48876"
},
{
"name": "CVE-2024-53681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53681"
},
{
"name": "CVE-2024-54460",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54460"
},
{
"name": "CVE-2024-55642",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-55642"
},
{
"name": "CVE-2024-56613",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56613"
},
{
"name": "CVE-2024-56624",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56624"
},
{
"name": "CVE-2024-56638",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56638"
},
{
"name": "CVE-2024-56653",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56653"
},
{
"name": "CVE-2024-56657",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56657"
},
{
"name": "CVE-2024-56669",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56669"
},
{
"name": "CVE-2024-56710",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56710"
},
{
"name": "CVE-2024-56714",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56714"
},
{
"name": "CVE-2024-56772",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56772"
},
{
"name": "CVE-2024-56773",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56773"
},
{
"name": "CVE-2024-57878",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57878"
},
{
"name": "CVE-2024-57879",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57879"
},
{
"name": "CVE-2024-57885",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57885"
},
{
"name": "CVE-2025-21644",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21644"
},
{
"name": "CVE-2025-21659",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21659"
},
{
"name": "CVE-2024-56171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56171"
},
{
"name": "CVE-2025-27113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27113"
},
{
"name": "CVE-2024-57993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57993"
},
{
"name": "CVE-2024-58009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58009"
},
{
"name": "CVE-2024-58061",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58061"
},
{
"name": "CVE-2024-58068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58068"
},
{
"name": "CVE-2024-58077",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58077"
},
{
"name": "CVE-2025-21706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21706"
},
{
"name": "CVE-2025-21707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21707"
},
{
"name": "CVE-2025-21829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21829"
},
{
"name": "CVE-2025-21830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21830"
},
{
"name": "CVE-2025-21832",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21832"
},
{
"name": "CVE-2022-49057",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49057"
},
{
"name": "CVE-2022-49062",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49062"
},
{
"name": "CVE-2022-49064",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49064"
},
{
"name": "CVE-2022-49070",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49070"
},
{
"name": "CVE-2022-49139",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49139"
},
{
"name": "CVE-2022-49204",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49204"
},
{
"name": "CVE-2022-49205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49205"
},
{
"name": "CVE-2022-49207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49207"
},
{
"name": "CVE-2022-49209",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49209"
},
{
"name": "CVE-2022-49225",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49225"
},
{
"name": "CVE-2022-49228",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49228"
},
{
"name": "CVE-2022-49237",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49237"
},
{
"name": "CVE-2022-49330",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49330"
},
{
"name": "CVE-2022-49353",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49353"
},
{
"name": "CVE-2022-49406",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49406"
},
{
"name": "CVE-2022-49436",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49436"
},
{
"name": "CVE-2022-49446",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49446"
},
{
"name": "CVE-2022-49476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49476"
},
{
"name": "CVE-2022-49511",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49511"
},
{
"name": "CVE-2022-49518",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49518"
},
{
"name": "CVE-2022-49538",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49538"
},
{
"name": "CVE-2022-49548",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49548"
},
{
"name": "CVE-2022-49552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49552"
},
{
"name": "CVE-2022-49560",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49560"
},
{
"name": "CVE-2022-49565",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49565"
},
{
"name": "CVE-2022-49624",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49624"
},
{
"name": "CVE-2022-49638",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49638"
},
{
"name": "CVE-2022-49655",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49655"
},
{
"name": "CVE-2022-49658",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49658"
},
{
"name": "CVE-2022-49697",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49697"
},
{
"name": "CVE-2022-49732",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49732"
},
{
"name": "CVE-2022-49739",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49739"
},
{
"name": "CVE-2022-49746",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49746"
},
{
"name": "CVE-2022-49759",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49759"
},
{
"name": "CVE-2023-52933",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52933"
},
{
"name": "CVE-2023-52941",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52941"
},
{
"name": "CVE-2023-52976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52976"
},
{
"name": "CVE-2023-52984",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52984"
},
{
"name": "CVE-2023-52992",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52992"
},
{
"name": "CVE-2023-52993",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52993"
},
{
"name": "CVE-2023-53006",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53006"
},
{
"name": "CVE-2023-53007",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53007"
},
{
"name": "CVE-2023-53015",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53015"
},
{
"name": "CVE-2023-53016",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53016"
},
{
"name": "CVE-2023-53019",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53019"
},
{
"name": "CVE-2023-53026",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53026"
},
{
"name": "CVE-2023-53029",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53029"
},
{
"name": "CVE-2023-53030",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53030"
},
{
"name": "CVE-2023-53033",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53033"
},
{
"name": "CVE-2024-46736",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46736"
},
{
"name": "CVE-2024-46796",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46796"
},
{
"name": "CVE-2024-57990",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57990"
},
{
"name": "CVE-2024-57999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57999"
},
{
"name": "CVE-2024-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58057"
},
{
"name": "CVE-2024-58078",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58078"
},
{
"name": "CVE-2024-58079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58079"
},
{
"name": "CVE-2025-21723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21723"
},
{
"name": "CVE-2025-21732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21732"
},
{
"name": "CVE-2025-21810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21810"
},
{
"name": "CVE-2025-21825",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21825"
},
{
"name": "CVE-2025-21828",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21828"
},
{
"name": "CVE-2025-21844",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21844"
},
{
"name": "CVE-2025-21847",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21847"
},
{
"name": "CVE-2025-21856",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21856"
},
{
"name": "CVE-2025-21857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21857"
},
{
"name": "CVE-2025-21864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21864"
},
{
"name": "CVE-2025-21869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21869"
},
{
"name": "CVE-2025-21870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21870"
},
{
"name": "CVE-2025-21876",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21876"
},
{
"name": "CVE-2025-21883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21883"
},
{
"name": "CVE-2025-21886",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21886"
},
{
"name": "CVE-2025-21888",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21888"
},
{
"name": "CVE-2025-21890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21890"
},
{
"name": "CVE-2024-8176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8176"
},
{
"name": "CVE-2025-24928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24928"
},
{
"name": "CVE-2025-21913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21913"
},
{
"name": "CVE-2025-21916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21916"
},
{
"name": "CVE-2025-21918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21918"
},
{
"name": "CVE-2025-21924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21924"
},
{
"name": "CVE-2025-21936",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21936"
},
{
"name": "CVE-2025-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21938"
},
{
"name": "CVE-2025-21962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21962"
},
{
"name": "CVE-2025-21963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21963"
},
{
"name": "CVE-2025-21964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21964"
},
{
"name": "CVE-2025-21978",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21978"
},
{
"name": "CVE-2025-21979",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21979"
},
{
"name": "CVE-2025-21986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21986"
},
{
"name": "CVE-2022-49220",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49220"
},
{
"name": "CVE-2022-49372",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49372"
},
{
"name": "CVE-2022-49578",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49578"
},
{
"name": "CVE-2022-49589",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49589"
},
{
"name": "CVE-2022-49620",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49620"
},
{
"name": "CVE-2023-52997",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52997"
},
{
"name": "CVE-2023-53031",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53031"
},
{
"name": "CVE-2024-57952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57952"
},
{
"name": "CVE-2025-21691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21691"
},
{
"name": "CVE-2025-27516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27516"
},
{
"name": "CVE-2025-21953",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21953"
},
{
"name": "CVE-2025-4516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4516"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2025-32414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32414"
},
{
"name": "CVE-2025-32415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32415"
},
{
"name": "CVE-2022-49171",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49171"
},
{
"name": "CVE-2022-49197",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49197"
},
{
"name": "CVE-2022-49561",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49561"
},
{
"name": "CVE-2022-49590",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49590"
},
{
"name": "CVE-2023-52928",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52928"
},
{
"name": "CVE-2023-52937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52937"
},
{
"name": "CVE-2023-52938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52938"
},
{
"name": "CVE-2023-52981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52981"
},
{
"name": "CVE-2023-52982",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52982"
},
{
"name": "CVE-2023-52986",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52986"
},
{
"name": "CVE-2023-53009",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53009"
},
{
"name": "CVE-2023-53032",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53032"
},
{
"name": "CVE-2024-58070",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58070"
},
{
"name": "CVE-2024-58088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58088"
},
{
"name": "CVE-2025-21808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21808"
},
{
"name": "CVE-2025-21836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21836"
},
{
"name": "CVE-2025-21854",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21854"
},
{
"name": "CVE-2025-21884",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21884"
},
{
"name": "CVE-2025-21889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21889"
},
{
"name": "CVE-2025-21895",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21895"
},
{
"name": "CVE-2025-21906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21906"
},
{
"name": "CVE-2025-21908",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21908"
},
{
"name": "CVE-2025-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21930"
},
{
"name": "CVE-2025-21961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21961"
},
{
"name": "CVE-2025-21966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21966"
},
{
"name": "CVE-2025-4947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4947"
},
{
"name": "CVE-2025-5025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5025"
},
{
"name": "CVE-2024-56433",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56433"
},
{
"name": "CVE-2025-1390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1390"
},
{
"name": "CVE-2025-29088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29088"
},
{
"name": "CVE-2025-32434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32434"
},
{
"name": "CVE-2025-43859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43859"
},
{
"name": "CVE-2024-58074",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58074"
},
{
"name": "CVE-2025-21974",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21974"
},
{
"name": "CVE-2025-6021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"
},
{
"name": "CVE-2022-49636",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49636"
},
{
"name": "CVE-2025-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21939"
},
{
"name": "CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"name": "CVE-2025-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3576"
},
{
"name": "CVE-2024-57987",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57987"
},
{
"name": "CVE-2024-57988",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57988"
},
{
"name": "CVE-2024-57995",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57995"
},
{
"name": "CVE-2024-58015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58015"
},
{
"name": "CVE-2024-58062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58062"
},
{
"name": "CVE-2025-21713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21713"
},
{
"name": "CVE-2025-21770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21770"
},
{
"name": "CVE-2025-21880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21880"
},
{
"name": "CVE-2021-3995",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3995"
},
{
"name": "CVE-2021-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3996"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2025-21809",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21809"
},
{
"name": "CVE-2025-8194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
},
{
"name": "CVE-2025-50182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50182"
},
{
"name": "CVE-2021-47316",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47316"
},
{
"name": "CVE-2021-32256",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32256"
},
{
"name": "CVE-2024-25260",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25260"
},
{
"name": "CVE-2025-1371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1371"
},
{
"name": "CVE-2025-1376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1376"
},
{
"name": "CVE-2025-1377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1377"
},
{
"name": "CVE-2025-49794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49794"
},
{
"name": "CVE-2025-49796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
},
{
"name": "CVE-2024-54456",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54456"
},
{
"name": "CVE-2025-21783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21783"
},
{
"name": "CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"name": "CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"name": "CVE-2024-26462",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26462"
},
{
"name": "CVE-2025-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1352"
},
{
"name": "CVE-2025-1365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1365"
},
{
"name": "CVE-2025-1372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1372"
},
{
"name": "CVE-2025-27587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27587"
},
{
"name": "CVE-2025-49795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49795"
},
{
"name": "CVE-2025-6170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6170"
},
{
"name": "CVE-2025-8732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8732"
},
{
"name": "CVE-2025-9086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9086"
},
{
"name": "CVE-2025-41248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41248"
}
],
"initial_release_date": "2025-12-02T00:00:00",
"last_revision_date": "2025-12-02T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-1057",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-12-02T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2025-12-01",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36560",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36560"
},
{
"published_at": "2025-12-01",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36564",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36564"
}
]
}
CERTFR-2024-AVI-0422
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, une atteinte à la confidentialité des données et un déni de service.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 16.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 18.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 20.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 14.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 23.10",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 22.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-52633",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52633"
},
{
"name": "CVE-2024-26825",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26825"
},
{
"name": "CVE-2023-52622",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52622"
},
{
"name": "CVE-2024-26696",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26696"
},
{
"name": "CVE-2024-26614",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26614"
},
{
"name": "CVE-2024-26715",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26715"
},
{
"name": "CVE-2023-52637",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52637"
},
{
"name": "CVE-2021-46939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46939"
},
{
"name": "CVE-2023-52491",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52491"
},
{
"name": "CVE-2024-26704",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26704"
},
{
"name": "CVE-2024-26671",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26671"
},
{
"name": "CVE-2024-26712",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26712"
},
{
"name": "CVE-2023-52642",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52642"
},
{
"name": "CVE-2024-26600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26600"
},
{
"name": "CVE-2023-52635",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52635"
},
{
"name": "CVE-2023-52489",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52489"
},
{
"name": "CVE-2023-52638",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52638"
},
{
"name": "CVE-2023-52492",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52492"
},
{
"name": "CVE-2024-26805",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26805"
},
{
"name": "CVE-2024-26665",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26665"
},
{
"name": "CVE-2024-26627",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26627"
},
{
"name": "CVE-2024-26910",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26910"
},
{
"name": "CVE-2023-52587",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52587"
},
{
"name": "CVE-2024-26698",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26698"
},
{
"name": "CVE-2024-26645",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26645"
},
{
"name": "CVE-2024-26702",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26702"
},
{
"name": "CVE-2024-26673",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26673"
},
{
"name": "CVE-2024-26720",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26720"
},
{
"name": "CVE-2024-26615",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26615"
},
{
"name": "CVE-2024-26801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26801"
},
{
"name": "CVE-2023-52618",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52618"
},
{
"name": "CVE-2023-52604",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52604"
},
{
"name": "CVE-2023-52643",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52643"
},
{
"name": "CVE-2023-52601",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52601"
},
{
"name": "CVE-2024-26722",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26722"
},
{
"name": "CVE-2024-26598",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26598"
},
{
"name": "CVE-2024-26679",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26679"
},
{
"name": "CVE-2023-52616",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52616"
},
{
"name": "CVE-2023-52435",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52435"
},
{
"name": "CVE-2024-26707",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26707"
},
{
"name": "CVE-2024-26695",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26695"
},
{
"name": "CVE-2023-52486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52486"
},
{
"name": "CVE-2023-52619",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52619"
},
{
"name": "CVE-2023-52617",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52617"
},
{
"name": "CVE-2024-26920",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26920"
},
{
"name": "CVE-2024-26593",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26593"
},
{
"name": "CVE-2024-26676",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26676"
},
{
"name": "CVE-2024-26916",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26916"
},
{
"name": "CVE-2024-26636",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26636"
},
{
"name": "CVE-2023-52524",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52524"
},
{
"name": "CVE-2024-26829",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26829"
},
{
"name": "CVE-2023-52493",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52493"
},
{
"name": "CVE-2024-26606",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26606"
},
{
"name": "CVE-2024-26625",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26625"
},
{
"name": "CVE-2024-26635",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26635"
},
{
"name": "CVE-2023-52631",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52631"
},
{
"name": "CVE-2023-52608",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52608"
},
{
"name": "CVE-2024-26592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26592"
},
{
"name": "CVE-2024-26697",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26697"
},
{
"name": "CVE-2024-26826",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26826"
},
{
"name": "CVE-2024-26685",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26685"
},
{
"name": "CVE-2023-52599",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52599"
},
{
"name": "CVE-2024-26663",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26663"
},
{
"name": "CVE-2023-52439",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52439"
},
{
"name": "CVE-2024-26675",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26675"
},
{
"name": "CVE-2024-26610",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26610"
},
{
"name": "CVE-2023-52583",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52583"
},
{
"name": "CVE-2023-52602",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52602"
},
{
"name": "CVE-2023-52498",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52498"
},
{
"name": "CVE-2024-1151",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1151"
},
{
"name": "CVE-2024-26668",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26668"
},
{
"name": "CVE-2024-26735",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26735"
},
{
"name": "CVE-2023-47233",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47233"
},
{
"name": "CVE-2024-26640",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26640"
},
{
"name": "CVE-2024-26594",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26594"
},
{
"name": "CVE-2023-52627",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52627"
},
{
"name": "CVE-2023-52588",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52588"
},
{
"name": "CVE-2024-26602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26602"
},
{
"name": "CVE-2024-26644",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26644"
},
{
"name": "CVE-2023-52598",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52598"
},
{
"name": "CVE-2023-52594",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52594"
},
{
"name": "CVE-2024-26808",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26808"
},
{
"name": "CVE-2023-52595",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52595"
},
{
"name": "CVE-2023-52623",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52623"
},
{
"name": "CVE-2024-26608",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26608"
},
{
"name": "CVE-2023-52615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52615"
},
{
"name": "CVE-2024-26660",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26660"
},
{
"name": "CVE-2024-26689",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26689"
},
{
"name": "CVE-2023-52606",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52606"
},
{
"name": "CVE-2023-52597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52597"
},
{
"name": "CVE-2024-26717",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26717"
},
{
"name": "CVE-2023-52566",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52566"
},
{
"name": "CVE-2021-46981",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46981"
},
{
"name": "CVE-2024-2201",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2201"
},
{
"name": "CVE-2024-26641",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26641"
},
{
"name": "CVE-2023-52530",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52530"
},
{
"name": "CVE-2023-52614",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52614"
},
{
"name": "CVE-2024-26664",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26664"
},
{
"name": "CVE-2023-52494",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52494"
},
{
"name": "CVE-2023-52607",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52607"
},
{
"name": "CVE-2024-23849",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23849"
},
{
"name": "CVE-2024-26684",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26684"
},
{
"name": "CVE-2024-26622",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26622"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0422",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-05-17T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux\nd\u0027Ubuntu. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire, une atteinte \u00e0 la confidentialit\u00e9 des\ndonn\u00e9es et un d\u00e9ni de service.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-6767-2 du 14 mai 2024",
"url": "https://ubuntu.com/security/notices/USN-6767-2"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-6777-1 du 16 mai 2024",
"url": "https://ubuntu.com/security/notices/USN-6777-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-6778-1 du 16 mai 2024",
"url": "https://ubuntu.com/security/notices/USN-6778-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-6774-1 du 16 mai 2024",
"url": "https://ubuntu.com/security/notices/USN-6774-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-6766-2 du 15 mai 2024",
"url": "https://ubuntu.com/security/notices/USN-6766-2"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-6775-1 du 16 mai 2024",
"url": "https://ubuntu.com/security/notices/USN-6775-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-6776-1 du 16 mai 2024",
"url": "https://ubuntu.com/security/notices/USN-6776-1"
}
]
}
CERTFR-2024-AVI-0497
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Red Hat. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 8.6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time for x86_64 - 4 years of updates 9.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.8 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - TUS 8.6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.8 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - TUS 8.8 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server for ARM 64 - 4 years of updates 9.2 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.8 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.2 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 9.2 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.8 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.8 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time for NFV for x86_64 - 4 years of updates 9.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.2 s390x | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.8 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.2 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 9.2 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.2 aarch64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 9.2 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 9.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.2 ppc64le | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.8 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.8 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.8 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server for IBM z Systems - 4 years of updates 9.2 s390x | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 9.2 s390x | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.2 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6 x86_64 |
| Title | Publication Time | Tags | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Red Hat Enterprise Linux Server - AUS 8.6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time for x86_64 - 4 years of updates 9.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.8 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - TUS 8.6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.8 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - TUS 8.8 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server for ARM 64 - 4 years of updates 9.2 aarch64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.8 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 9.2 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.8 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.8 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time for NFV for x86_64 - 4 years of updates 9.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.2 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.8 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 9.2 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.2 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 9.2 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 9.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.2 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.8 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.8 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.8 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server for IBM z Systems - 4 years of updates 9.2 s390x",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 9.2 s390x",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.2 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2023-49568",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49568"
},
{
"name": "CVE-2023-3128",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3128"
},
{
"name": "CVE-2024-26586",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26586"
},
{
"name": "CVE-2023-6536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6536"
},
{
"name": "CVE-2023-51779",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51779"
},
{
"name": "CVE-2024-26598",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26598"
},
{
"name": "CVE-2021-47013",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47013"
},
{
"name": "CVE-2023-6356",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6356"
},
{
"name": "CVE-2024-26642",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26642"
},
{
"name": "CVE-2023-52639",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52639"
},
{
"name": "CVE-2023-1998",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1998"
},
{
"name": "CVE-2023-4155",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4155"
},
{
"name": "CVE-2023-6535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6535"
},
{
"name": "CVE-2023-1118",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1118"
},
{
"name": "CVE-2023-52578",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52578"
},
{
"name": "CVE-2024-25742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25742"
},
{
"name": "CVE-2024-25743",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25743"
},
{
"name": "CVE-2024-26602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26602"
},
{
"name": "CVE-2023-52667",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52667"
},
{
"name": "CVE-2023-49569",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49569"
},
{
"name": "CVE-2023-4822",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4822"
},
{
"name": "CVE-2023-52530",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52530"
},
{
"name": "CVE-2023-5090",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5090"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0497",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-06-14T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Red Hat. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Red Hat",
"vendor_advisories": [
{
"published_at": "2024-06-12",
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2024:3855",
"url": "https://access.redhat.com/errata/RHSA-2024:3855"
},
{
"published_at": "2024-06-12",
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2024:3854",
"url": "https://access.redhat.com/errata/RHSA-2024:3854"
},
{
"published_at": "2024-06-12",
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2024:3859",
"url": "https://access.redhat.com/errata/RHSA-2024:3859"
},
{
"published_at": "2024-06-13",
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2024:3925",
"url": "https://access.redhat.com/errata/RHSA-2024:3925"
},
{
"published_at": "2024-06-11",
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2024:3810",
"url": "https://access.redhat.com/errata/RHSA-2024:3810"
}
]
}
CERTFR-2024-AVI-0333
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, un déni de service à distance et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 20.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 23.10",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 22.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-52436",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52436"
},
{
"name": "CVE-2023-52448",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52448"
},
{
"name": "CVE-2023-52456",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52456"
},
{
"name": "CVE-2023-46838",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46838"
},
{
"name": "CVE-2024-26586",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26586"
},
{
"name": "CVE-2023-52429",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52429"
},
{
"name": "CVE-2023-1194",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1194"
},
{
"name": "CVE-2023-52480",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52480"
},
{
"name": "CVE-2024-26589",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26589"
},
{
"name": "CVE-2024-26597",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26597"
},
{
"name": "CVE-2023-52441",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52441"
},
{
"name": "CVE-2023-52454",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52454"
},
{
"name": "CVE-2024-26631",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26631"
},
{
"name": "CVE-2023-52340",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52340"
},
{
"name": "CVE-2024-26598",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26598"
},
{
"name": "CVE-2023-52435",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52435"
},
{
"name": "CVE-2023-32254",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32254"
},
{
"name": "CVE-2023-52462",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52462"
},
{
"name": "CVE-2023-52609",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52609"
},
{
"name": "CVE-2023-52469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52469"
},
{
"name": "CVE-2023-52451",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52451"
},
{
"name": "CVE-2024-0607",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0607"
},
{
"name": "CVE-2024-24860",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24860"
},
{
"name": "CVE-2023-38430",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38430"
},
{
"name": "CVE-2023-52438",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52438"
},
{
"name": "CVE-2023-32258",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32258"
},
{
"name": "CVE-2023-52439",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52439"
},
{
"name": "CVE-2023-52470",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52470"
},
{
"name": "CVE-2023-52445",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52445"
},
{
"name": "CVE-2024-23850",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23850"
},
{
"name": "CVE-2023-52612",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52612"
},
{
"name": "CVE-2023-52434",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52434"
},
{
"name": "CVE-2024-23851",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23851"
},
{
"name": "CVE-2023-3867",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3867"
},
{
"name": "CVE-2023-50431",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50431"
},
{
"name": "CVE-2023-52458",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52458"
},
{
"name": "CVE-2024-26633",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26633"
},
{
"name": "CVE-2024-26591",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26591"
},
{
"name": "CVE-2023-52464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52464"
},
{
"name": "CVE-2023-52610",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52610"
},
{
"name": "CVE-2023-38427",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38427"
},
{
"name": "CVE-2023-52463",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52463"
},
{
"name": "CVE-2023-52467",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52467"
},
{
"name": "CVE-2023-52443",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52443"
},
{
"name": "CVE-2023-52442",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52442"
},
{
"name": "CVE-2024-22705",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22705"
},
{
"name": "CVE-2023-38431",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38431"
},
{
"name": "CVE-2023-6610",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6610"
},
{
"name": "CVE-2023-52457",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52457"
},
{
"name": "CVE-2023-52449",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52449"
},
{
"name": "CVE-2023-52444",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52444"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0333",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-04-19T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003ele noyau Linux d\u0027Ubuntu\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par\nl\u0027\u00e9diteur, un d\u00e9ni de service \u00e0 distance et une \u00e9l\u00e9vation de privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-6725-2 du 16 avril 2024",
"url": "https://ubuntu.com/security/notices/USN-6725-2"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-6726-3 du 17 avril 2024",
"url": "https://ubuntu.com/security/notices/USN-6726-3"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-6724-2 du 16 avril 2024",
"url": "https://ubuntu.com/security/notices/USN-6724-2"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-6726-2 du 16 avril 2024",
"url": "https://ubuntu.com/security/notices/USN-6726-2"
}
]
}
CERTFR-2024-AVI-0422
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, une atteinte à la confidentialité des données et un déni de service.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 16.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 18.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 20.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 14.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 23.10",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 22.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-52633",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52633"
},
{
"name": "CVE-2024-26825",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26825"
},
{
"name": "CVE-2023-52622",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52622"
},
{
"name": "CVE-2024-26696",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26696"
},
{
"name": "CVE-2024-26614",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26614"
},
{
"name": "CVE-2024-26715",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26715"
},
{
"name": "CVE-2023-52637",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52637"
},
{
"name": "CVE-2021-46939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46939"
},
{
"name": "CVE-2023-52491",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52491"
},
{
"name": "CVE-2024-26704",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26704"
},
{
"name": "CVE-2024-26671",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26671"
},
{
"name": "CVE-2024-26712",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26712"
},
{
"name": "CVE-2023-52642",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52642"
},
{
"name": "CVE-2024-26600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26600"
},
{
"name": "CVE-2023-52635",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52635"
},
{
"name": "CVE-2023-52489",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52489"
},
{
"name": "CVE-2023-52638",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52638"
},
{
"name": "CVE-2023-52492",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52492"
},
{
"name": "CVE-2024-26805",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26805"
},
{
"name": "CVE-2024-26665",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26665"
},
{
"name": "CVE-2024-26627",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26627"
},
{
"name": "CVE-2024-26910",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26910"
},
{
"name": "CVE-2023-52587",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52587"
},
{
"name": "CVE-2024-26698",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26698"
},
{
"name": "CVE-2024-26645",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26645"
},
{
"name": "CVE-2024-26702",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26702"
},
{
"name": "CVE-2024-26673",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26673"
},
{
"name": "CVE-2024-26720",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26720"
},
{
"name": "CVE-2024-26615",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26615"
},
{
"name": "CVE-2024-26801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26801"
},
{
"name": "CVE-2023-52618",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52618"
},
{
"name": "CVE-2023-52604",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52604"
},
{
"name": "CVE-2023-52643",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52643"
},
{
"name": "CVE-2023-52601",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52601"
},
{
"name": "CVE-2024-26722",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26722"
},
{
"name": "CVE-2024-26598",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26598"
},
{
"name": "CVE-2024-26679",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26679"
},
{
"name": "CVE-2023-52616",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52616"
},
{
"name": "CVE-2023-52435",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52435"
},
{
"name": "CVE-2024-26707",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26707"
},
{
"name": "CVE-2024-26695",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26695"
},
{
"name": "CVE-2023-52486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52486"
},
{
"name": "CVE-2023-52619",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52619"
},
{
"name": "CVE-2023-52617",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52617"
},
{
"name": "CVE-2024-26920",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26920"
},
{
"name": "CVE-2024-26593",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26593"
},
{
"name": "CVE-2024-26676",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26676"
},
{
"name": "CVE-2024-26916",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26916"
},
{
"name": "CVE-2024-26636",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26636"
},
{
"name": "CVE-2023-52524",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52524"
},
{
"name": "CVE-2024-26829",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26829"
},
{
"name": "CVE-2023-52493",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52493"
},
{
"name": "CVE-2024-26606",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26606"
},
{
"name": "CVE-2024-26625",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26625"
},
{
"name": "CVE-2024-26635",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26635"
},
{
"name": "CVE-2023-52631",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52631"
},
{
"name": "CVE-2023-52608",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52608"
},
{
"name": "CVE-2024-26592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26592"
},
{
"name": "CVE-2024-26697",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26697"
},
{
"name": "CVE-2024-26826",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26826"
},
{
"name": "CVE-2024-26685",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26685"
},
{
"name": "CVE-2023-52599",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52599"
},
{
"name": "CVE-2024-26663",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26663"
},
{
"name": "CVE-2023-52439",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52439"
},
{
"name": "CVE-2024-26675",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26675"
},
{
"name": "CVE-2024-26610",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26610"
},
{
"name": "CVE-2023-52583",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52583"
},
{
"name": "CVE-2023-52602",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52602"
},
{
"name": "CVE-2023-52498",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52498"
},
{
"name": "CVE-2024-1151",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1151"
},
{
"name": "CVE-2024-26668",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26668"
},
{
"name": "CVE-2024-26735",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26735"
},
{
"name": "CVE-2023-47233",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47233"
},
{
"name": "CVE-2024-26640",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26640"
},
{
"name": "CVE-2024-26594",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26594"
},
{
"name": "CVE-2023-52627",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52627"
},
{
"name": "CVE-2023-52588",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52588"
},
{
"name": "CVE-2024-26602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26602"
},
{
"name": "CVE-2024-26644",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26644"
},
{
"name": "CVE-2023-52598",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52598"
},
{
"name": "CVE-2023-52594",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52594"
},
{
"name": "CVE-2024-26808",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26808"
},
{
"name": "CVE-2023-52595",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52595"
},
{
"name": "CVE-2023-52623",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52623"
},
{
"name": "CVE-2024-26608",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26608"
},
{
"name": "CVE-2023-52615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52615"
},
{
"name": "CVE-2024-26660",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26660"
},
{
"name": "CVE-2024-26689",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26689"
},
{
"name": "CVE-2023-52606",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52606"
},
{
"name": "CVE-2023-52597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52597"
},
{
"name": "CVE-2024-26717",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26717"
},
{
"name": "CVE-2023-52566",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52566"
},
{
"name": "CVE-2021-46981",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46981"
},
{
"name": "CVE-2024-2201",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2201"
},
{
"name": "CVE-2024-26641",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26641"
},
{
"name": "CVE-2023-52530",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52530"
},
{
"name": "CVE-2023-52614",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52614"
},
{
"name": "CVE-2024-26664",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26664"
},
{
"name": "CVE-2023-52494",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52494"
},
{
"name": "CVE-2023-52607",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52607"
},
{
"name": "CVE-2024-23849",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23849"
},
{
"name": "CVE-2024-26684",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26684"
},
{
"name": "CVE-2024-26622",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26622"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0422",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-05-17T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux\nd\u0027Ubuntu. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire, une atteinte \u00e0 la confidentialit\u00e9 des\ndonn\u00e9es et un d\u00e9ni de service.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-6767-2 du 14 mai 2024",
"url": "https://ubuntu.com/security/notices/USN-6767-2"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-6777-1 du 16 mai 2024",
"url": "https://ubuntu.com/security/notices/USN-6777-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-6778-1 du 16 mai 2024",
"url": "https://ubuntu.com/security/notices/USN-6778-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-6774-1 du 16 mai 2024",
"url": "https://ubuntu.com/security/notices/USN-6774-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-6766-2 du 15 mai 2024",
"url": "https://ubuntu.com/security/notices/USN-6766-2"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-6775-1 du 16 mai 2024",
"url": "https://ubuntu.com/security/notices/USN-6775-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-6776-1 du 16 mai 2024",
"url": "https://ubuntu.com/security/notices/USN-6776-1"
}
]
}
CERTFR-2024-AVI-0242
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15 SP5 | ||
| SUSE | N/A | Legacy Module 15-SP5 | ||
| SUSE | openSUSE Leap | openSUSE Leap 15.5 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 15-SP5 | ||
| SUSE | SUSE Linux Enterprise Desktop | SUSE Linux Enterprise Desktop 15 SP5 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15 SP4 | ||
| SUSE | SUSE Manager Retail Branch Server | SUSE Manager Retail Branch Server 4.3 | ||
| SUSE | openSUSE Leap | openSUSE Leap 15.4 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability Extension 15 SP4 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability Extension 15 SP5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP5 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro for Rancher 5.4 | ||
| SUSE | SUSE Real Time Module | SUSE Real Time Module 15-SP5 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 | ||
| SUSE | Basesystem Module | Basesystem Module 15-SP5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15 SP5 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.3 | ||
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time 15 SP5 | ||
| SUSE | openSUSE Leap | openSUSE Leap Micro 5.3 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro for Rancher 5.3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 | ||
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time 15 SP4 | ||
| SUSE | SUSE Manager Proxy | SUSE Manager Proxy 4.3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15 SP4 | ||
| SUSE | SUSE Linux Enterprise Desktop | SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.5 | ||
| SUSE | openSUSE Leap | openSUSE Leap Micro 5.4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 15 SP5 | ||
| SUSE | N/A | Development Tools Module 15-SP5 | ||
| SUSE | SUSE Manager Server | SUSE Manager Server 4.3 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.4 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 15-SP4 |
| Title | Publication Time | Tags | |||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise High Performance Computing 15 SP5",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Legacy Module 15-SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.5",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Desktop 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Desktop",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15 SP4",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Retail Branch Server 4.3",
"product": {
"name": "SUSE Manager Retail Branch Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.4",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability Extension 15 SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing LTSS 15 SP4",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability Extension 15 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro for Rancher 5.4",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Real Time Module 15-SP5",
"product": {
"name": "SUSE Real Time Module",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Basesystem Module 15-SP5",
"product": {
"name": "Basesystem Module",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.3",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Real Time",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap Micro 5.3",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro for Rancher 5.3",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Real Time",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Proxy 4.3",
"product": {
"name": "SUSE Manager Proxy",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4",
"product": {
"name": "SUSE Linux Enterprise Desktop",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.5",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap Micro 5.4",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 15 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Development Tools Module 15-SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Server 4.3",
"product": {
"name": "SUSE Manager Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.4",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-35827",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35827"
},
{
"name": "CVE-2023-52448",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52448"
},
{
"name": "CVE-2023-52456",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52456"
},
{
"name": "CVE-2024-26595",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26595"
},
{
"name": "CVE-2021-47076",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47076"
},
{
"name": "CVE-2023-52532",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52532"
},
{
"name": "CVE-2020-36777",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36777"
},
{
"name": "CVE-2021-47078",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47078"
},
{
"name": "CVE-2024-26586",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26586"
},
{
"name": "CVE-2024-26585",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26585"
},
{
"name": "CVE-2024-25744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25744"
},
{
"name": "CVE-2023-52429",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52429"
},
{
"name": "CVE-2023-52559",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52559"
},
{
"name": "CVE-2021-46953",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46953"
},
{
"name": "CVE-2024-26603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26603"
},
{
"name": "CVE-2023-28746",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28746"
},
{
"name": "CVE-2021-46904",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46904"
},
{
"name": "CVE-2024-26589",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26589"
},
{
"name": "CVE-2019-25162",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25162"
},
{
"name": "CVE-2023-52478",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52478"
},
{
"name": "CVE-2023-46343",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46343"
},
{
"name": "CVE-2021-46968",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46968"
},
{
"name": "CVE-2021-46929",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46929"
},
{
"name": "CVE-2021-46905",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46905"
},
{
"name": "CVE-2021-47061",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47061"
},
{
"name": "CVE-2021-46924",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46924"
},
{
"name": "CVE-2021-46906",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46906"
},
{
"name": "CVE-2021-47012",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47012"
},
{
"name": "CVE-2023-52340",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52340"
},
{
"name": "CVE-2023-6817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6817"
},
{
"name": "CVE-2023-52605",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52605"
},
{
"name": "CVE-2021-46964",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46964"
},
{
"name": "CVE-2024-26598",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26598"
},
{
"name": "CVE-2023-52482",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52482"
},
{
"name": "CVE-2022-20154",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20154"
},
{
"name": "CVE-2021-47013",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47013"
},
{
"name": "CVE-2021-46966",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46966"
},
{
"name": "CVE-2023-52475",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52475"
},
{
"name": "CVE-2024-26593",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26593"
},
{
"name": "CVE-2023-6270",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6270"
},
{
"name": "CVE-2022-48627",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48627"
},
{
"name": "CVE-2021-46915",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46915"
},
{
"name": "CVE-2023-52462",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52462"
},
{
"name": "CVE-2021-46989",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46989"
},
{
"name": "CVE-2021-47054",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47054"
},
{
"name": "CVE-2023-52484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52484"
},
{
"name": "CVE-2023-52569",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52569"
},
{
"name": "CVE-2023-52451",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52451"
},
{
"name": "CVE-2024-0607",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0607"
},
{
"name": "CVE-2024-26607",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26607"
},
{
"name": "CVE-2023-52439",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52439"
},
{
"name": "CVE-2023-52574",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52574"
},
{
"name": "CVE-2023-52445",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52445"
},
{
"name": "CVE-2024-23850",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23850"
},
{
"name": "CVE-2021-47083",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47083"
},
{
"name": "CVE-2021-47060",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47060"
},
{
"name": "CVE-2021-46974",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46974"
},
{
"name": "CVE-2024-1151",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1151"
},
{
"name": "CVE-2024-23851",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23851"
},
{
"name": "CVE-2021-46923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46923"
},
{
"name": "CVE-2024-26602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26602"
},
{
"name": "CVE-2021-46934",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46934"
},
{
"name": "CVE-2021-46932",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46932"
},
{
"name": "CVE-2024-26591",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26591"
},
{
"name": "CVE-2023-52447",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52447"
},
{
"name": "CVE-2023-52464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52464"
},
{
"name": "CVE-2021-47069",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47069"
},
{
"name": "CVE-2023-52502",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52502"
},
{
"name": "CVE-2023-52597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52597"
},
{
"name": "CVE-2023-5197",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5197"
},
{
"name": "CVE-2023-52531",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52531"
},
{
"name": "CVE-2023-51042",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51042"
},
{
"name": "CVE-2023-52463",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52463"
},
{
"name": "CVE-2023-52467",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52467"
},
{
"name": "CVE-2024-0340",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0340"
},
{
"name": "CVE-2023-52443",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52443"
},
{
"name": "CVE-2023-52530",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52530"
},
{
"name": "CVE-2021-47005",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47005"
},
{
"name": "CVE-2020-36784",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36784"
},
{
"name": "CVE-2023-52452",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52452"
},
{
"name": "CVE-2024-23849",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23849"
},
{
"name": "CVE-2022-48628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48628"
},
{
"name": "CVE-2024-26622",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26622"
},
{
"name": "CVE-2023-52457",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52457"
},
{
"name": "CVE-2023-52449",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52449"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0242",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-03-22T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003ele noyau Linux de SUSE\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non\nsp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de code arbitraire et un d\u00e9ni de\nservice \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:0900-1 du 14 mars 2024",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20240900-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:0857-1 du 13 mars 2024",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20240857-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:0855-1 du 12 mars 2024",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20240855-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:0858-1 du 13 mars 2024",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20240858-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:0900-2 du 15 mars 2024",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20240900-2"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:0910-1 du 15 mars 2024",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20240910-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:0856-1 du 13 mars 2024",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20240856-1"
}
]
}
CERTFR-2024-AVI-0383
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à la confidentialité des données et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 18.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 20.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 22.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-52633",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52633"
},
{
"name": "CVE-2024-26825",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26825"
},
{
"name": "CVE-2023-52622",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52622"
},
{
"name": "CVE-2023-52448",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52448"
},
{
"name": "CVE-2024-26696",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26696"
},
{
"name": "CVE-2023-52456",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52456"
},
{
"name": "CVE-2024-26650",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26650"
},
{
"name": "CVE-2024-26614",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26614"
},
{
"name": "CVE-2024-26595",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26595"
},
{
"name": "CVE-2024-26634",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26634"
},
{
"name": "CVE-2023-52621",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52621"
},
{
"name": "CVE-2024-26629",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26629"
},
{
"name": "CVE-2024-26586",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26586"
},
{
"name": "CVE-2024-26715",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26715"
},
{
"name": "CVE-2023-52637",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52637"
},
{
"name": "CVE-2024-26585",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26585"
},
{
"name": "CVE-2024-26638",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26638"
},
{
"name": "CVE-2023-52491",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52491"
},
{
"name": "CVE-2024-26704",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26704"
},
{
"name": "CVE-2024-26671",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26671"
},
{
"name": "CVE-2023-6536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6536"
},
{
"name": "CVE-2023-52453",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52453"
},
{
"name": "CVE-2024-26712",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26712"
},
{
"name": "CVE-2023-52642",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52642"
},
{
"name": "CVE-2024-26600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26600"
},
{
"name": "CVE-2023-52635",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52635"
},
{
"name": "CVE-2023-52593",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52593"
},
{
"name": "CVE-2023-52489",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52489"
},
{
"name": "CVE-2023-52638",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52638"
},
{
"name": "CVE-2023-52492",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52492"
},
{
"name": "CVE-2024-26665",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26665"
},
{
"name": "CVE-2023-52611",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52611"
},
{
"name": "CVE-2023-52454",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52454"
},
{
"name": "CVE-2024-26627",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26627"
},
{
"name": "CVE-2023-52632",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52632"
},
{
"name": "CVE-2024-26910",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26910"
},
{
"name": "CVE-2023-52587",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52587"
},
{
"name": "CVE-2024-26698",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26698"
},
{
"name": "CVE-2024-26632",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26632"
},
{
"name": "CVE-2024-26645",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26645"
},
{
"name": "CVE-2024-26702",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26702"
},
{
"name": "CVE-2024-26631",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26631"
},
{
"name": "CVE-2024-26673",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26673"
},
{
"name": "CVE-2024-26720",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26720"
},
{
"name": "CVE-2024-26615",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26615"
},
{
"name": "CVE-2024-26669",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26669"
},
{
"name": "CVE-2023-52618",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52618"
},
{
"name": "CVE-2023-52604",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52604"
},
{
"name": "CVE-2023-52643",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52643"
},
{
"name": "CVE-2023-52601",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52601"
},
{
"name": "CVE-2024-26722",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26722"
},
{
"name": "CVE-2024-26598",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26598"
},
{
"name": "CVE-2024-26679",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26679"
},
{
"name": "CVE-2023-52616",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52616"
},
{
"name": "CVE-2023-52435",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52435"
},
{
"name": "CVE-2024-26707",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26707"
},
{
"name": "CVE-2023-52455",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52455"
},
{
"name": "CVE-2024-26695",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26695"
},
{
"name": "CVE-2024-26647",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26647"
},
{
"name": "CVE-2024-26623",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26623"
},
{
"name": "CVE-2023-52486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52486"
},
{
"name": "CVE-2024-26670",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26670"
},
{
"name": "CVE-2023-52619",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52619"
},
{
"name": "CVE-2023-52617",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52617"
},
{
"name": "CVE-2024-26920",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26920"
},
{
"name": "CVE-2024-26593",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26593"
},
{
"name": "CVE-2024-26676",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26676"
},
{
"name": "CVE-2024-26916",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26916"
},
{
"name": "CVE-2023-52462",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52462"
},
{
"name": "CVE-2024-26636",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26636"
},
{
"name": "CVE-2023-6356",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6356"
},
{
"name": "CVE-2023-52609",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52609"
},
{
"name": "CVE-2024-26829",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26829"
},
{
"name": "CVE-2023-52469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52469"
},
{
"name": "CVE-2023-52493",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52493"
},
{
"name": "CVE-2023-52584",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52584"
},
{
"name": "CVE-2024-26606",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26606"
},
{
"name": "CVE-2023-52488",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52488"
},
{
"name": "CVE-2024-26625",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26625"
},
{
"name": "CVE-2024-26635",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26635"
},
{
"name": "CVE-2023-52451",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52451"
},
{
"name": "CVE-2024-26649",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26649"
},
{
"name": "CVE-2023-52631",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52631"
},
{
"name": "CVE-2023-52608",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52608"
},
{
"name": "CVE-2024-26592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26592"
},
{
"name": "CVE-2023-52589",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52589"
},
{
"name": "CVE-2024-26697",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26697"
},
{
"name": "CVE-2024-26826",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26826"
},
{
"name": "CVE-2024-26583",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26583"
},
{
"name": "CVE-2024-26685",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26685"
},
{
"name": "CVE-2024-24860",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24860"
},
{
"name": "CVE-2023-52599",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52599"
},
{
"name": "CVE-2023-52473",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52473"
},
{
"name": "CVE-2024-26607",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26607"
},
{
"name": "CVE-2023-52472",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52472"
},
{
"name": "CVE-2024-26663",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26663"
},
{
"name": "CVE-2024-26675",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26675"
},
{
"name": "CVE-2023-52470",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52470"
},
{
"name": "CVE-2024-26610",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26610"
},
{
"name": "CVE-2023-52583",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52583"
},
{
"name": "CVE-2024-26584",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26584"
},
{
"name": "CVE-2023-52602",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52602"
},
{
"name": "CVE-2023-52445",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52445"
},
{
"name": "CVE-2023-6535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6535"
},
{
"name": "CVE-2023-52498",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52498"
},
{
"name": "CVE-2024-26618",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26618"
},
{
"name": "CVE-2023-52446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52446"
},
{
"name": "CVE-2023-52487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52487"
},
{
"name": "CVE-2024-1151",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1151"
},
{
"name": "CVE-2023-52497",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52497"
},
{
"name": "CVE-2024-26646",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26646"
},
{
"name": "CVE-2024-26668",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26668"
},
{
"name": "CVE-2023-52612",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52612"
},
{
"name": "CVE-2024-26640",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26640"
},
{
"name": "CVE-2024-26594",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26594"
},
{
"name": "CVE-2023-52627",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52627"
},
{
"name": "CVE-2023-52458",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52458"
},
{
"name": "CVE-2023-52588",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52588"
},
{
"name": "CVE-2023-52468",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52468"
},
{
"name": "CVE-2024-26602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26602"
},
{
"name": "CVE-2024-26644",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26644"
},
{
"name": "CVE-2023-52465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52465"
},
{
"name": "CVE-2023-52598",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52598"
},
{
"name": "CVE-2023-52490",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52490"
},
{
"name": "CVE-2024-26633",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26633"
},
{
"name": "CVE-2023-52450",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52450"
},
{
"name": "CVE-2023-52594",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52594"
},
{
"name": "CVE-2024-26808",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26808"
},
{
"name": "CVE-2023-52595",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52595"
},
{
"name": "CVE-2024-26620",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26620"
},
{
"name": "CVE-2023-52623",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52623"
},
{
"name": "CVE-2023-52447",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52447"
},
{
"name": "CVE-2023-52464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52464"
},
{
"name": "CVE-2024-26608",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26608"
},
{
"name": "CVE-2023-52615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52615"
},
{
"name": "CVE-2023-52610",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52610"
},
{
"name": "CVE-2024-26660",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26660"
},
{
"name": "CVE-2024-26689",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26689"
},
{
"name": "CVE-2023-52606",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52606"
},
{
"name": "CVE-2023-52597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52597"
},
{
"name": "CVE-2023-52495",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52495"
},
{
"name": "CVE-2024-26717",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26717"
},
{
"name": "CVE-2024-26616",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26616"
},
{
"name": "CVE-2024-26582",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26582"
},
{
"name": "CVE-2024-2201",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2201"
},
{
"name": "CVE-2024-26641",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26641"
},
{
"name": "CVE-2023-52626",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52626"
},
{
"name": "CVE-2023-52463",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52463"
},
{
"name": "CVE-2023-52467",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52467"
},
{
"name": "CVE-2023-52443",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52443"
},
{
"name": "CVE-2023-52591",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52591"
},
{
"name": "CVE-2023-52614",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52614"
},
{
"name": "CVE-2024-26664",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26664"
},
{
"name": "CVE-2023-52452",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52452"
},
{
"name": "CVE-2023-52494",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52494"
},
{
"name": "CVE-2024-26612",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26612"
},
{
"name": "CVE-2023-52607",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52607"
},
{
"name": "CVE-2024-23849",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23849"
},
{
"name": "CVE-2024-26684",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26684"
},
{
"name": "CVE-2023-52457",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52457"
},
{
"name": "CVE-2023-52449",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52449"
},
{
"name": "CVE-2023-52444",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52444"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0383",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-05-10T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003ele noyau Linux d\u0027Ubuntu\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance,\nune atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une atteinte \u00e0\nl\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-6767-1 du 07 mai 2024",
"url": "https://ubuntu.com/security/notices/USN-6767-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-6765-1 du 07 mai 2024",
"url": "https://ubuntu.com/security/notices/USN-6765-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-6766-1 du 07 mai 2024",
"url": "https://ubuntu.com/security/notices/USN-6766-1"
}
]
}
CERTFR-2024-AVI-0226
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, une élévation de privilèges et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 16.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 18.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 20.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 14.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 22.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2024-26601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26601"
},
{
"name": "CVE-2024-1085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1085"
},
{
"name": "CVE-2023-52436",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52436"
},
{
"name": "CVE-2023-52448",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52448"
},
{
"name": "CVE-2023-52456",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52456"
},
{
"name": "CVE-2023-46838",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46838"
},
{
"name": "CVE-2021-44879",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44879"
},
{
"name": "CVE-2023-5633",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5633"
},
{
"name": "CVE-2023-51782",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51782"
},
{
"name": "CVE-2024-26600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26600"
},
{
"name": "CVE-2024-26589",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26589"
},
{
"name": "CVE-2024-0646",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0646"
},
{
"name": "CVE-2023-52593",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52593"
},
{
"name": "CVE-2024-26597",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26597"
},
{
"name": "CVE-2023-46343",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46343"
},
{
"name": "CVE-2023-52454",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52454"
},
{
"name": "CVE-2023-4244",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4244"
},
{
"name": "CVE-2024-26627",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26627"
},
{
"name": "CVE-2024-26581",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26581"
},
{
"name": "CVE-2023-52600",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52600"
},
{
"name": "CVE-2023-52587",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52587"
},
{
"name": "CVE-2023-51779",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51779"
},
{
"name": "CVE-2023-6817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6817"
},
{
"name": "CVE-2023-52605",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52605"
},
{
"name": "CVE-2024-0193",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0193"
},
{
"name": "CVE-2023-52604",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52604"
},
{
"name": "CVE-2023-52601",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52601"
},
{
"name": "CVE-2024-26598",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26598"
},
{
"name": "CVE-2023-52603",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52603"
},
{
"name": "CVE-2024-26628",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26628"
},
{
"name": "CVE-2023-52462",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52462"
},
{
"name": "CVE-2023-52469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52469"
},
{
"name": "CVE-2023-52584",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52584"
},
{
"name": "CVE-2024-26625",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26625"
},
{
"name": "CVE-2023-52451",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52451"
},
{
"name": "CVE-2024-0607",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0607"
},
{
"name": "CVE-2024-26599",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26599"
},
{
"name": "CVE-2024-26592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26592"
},
{
"name": "CVE-2023-52589",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52589"
},
{
"name": "CVE-2024-24860",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24860"
},
{
"name": "CVE-2023-52599",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52599"
},
{
"name": "CVE-2023-52438",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52438"
},
{
"name": "CVE-2023-52439",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52439"
},
{
"name": "CVE-2023-52470",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52470"
},
{
"name": "CVE-2023-46862",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46862"
},
{
"name": "CVE-2023-52583",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52583"
},
{
"name": "CVE-2023-52602",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52602"
},
{
"name": "CVE-2024-26588",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26588"
},
{
"name": "CVE-2023-52445",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52445"
},
{
"name": "CVE-2024-26624",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26624"
},
{
"name": "CVE-2023-51780",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51780"
},
{
"name": "CVE-2024-26594",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26594"
},
{
"name": "CVE-2023-50431",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50431"
},
{
"name": "CVE-2023-22995",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22995"
},
{
"name": "CVE-2023-52458",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52458"
},
{
"name": "CVE-2023-52588",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52588"
},
{
"name": "CVE-2023-52598",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52598"
},
{
"name": "CVE-2023-6932",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6932"
},
{
"name": "CVE-2023-52594",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52594"
},
{
"name": "CVE-2023-52595",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52595"
},
{
"name": "CVE-2024-26591",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26591"
},
{
"name": "CVE-2023-52447",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52447"
},
{
"name": "CVE-2023-52464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52464"
},
{
"name": "CVE-2023-52606",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52606"
},
{
"name": "CVE-2023-7192",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7192"
},
{
"name": "CVE-2023-52597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52597"
},
{
"name": "CVE-2023-4134",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4134"
},
{
"name": "CVE-2024-1086",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1086"
},
{
"name": "CVE-2023-52463",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52463"
},
{
"name": "CVE-2023-52467",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52467"
},
{
"name": "CVE-2024-0340",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0340"
},
{
"name": "CVE-2023-52443",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52443"
},
{
"name": "CVE-2023-6121",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6121"
},
{
"name": "CVE-2023-52607",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52607"
},
{
"name": "CVE-2024-23849",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23849"
},
{
"name": "CVE-2023-6610",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6610"
},
{
"name": "CVE-2023-52457",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52457"
},
{
"name": "CVE-2023-52449",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52449"
},
{
"name": "CVE-2023-52444",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52444"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0226",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-03-15T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003ele noyau Linux d\u0027Ubuntu\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire,\nune \u00e9l\u00e9vation de privil\u00e8ges et une atteinte \u00e0 la confidentialit\u00e9 des\ndonn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-6681-3 du 13 mars 2024",
"url": "https://ubuntu.com/security/notices/USN-6681-3"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-6688-1 du 11 mars 2024",
"url": "https://ubuntu.com/security/notices/USN-6688-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-6686-2 du 13 mars 2024",
"url": "https://ubuntu.com/security/notices/USN-6686-2"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu LSN-0101-1 du 12 mars 2024",
"url": "https://ubuntu.com/security/notices/LSN-0101-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-6681-2 du 11 mars 2024",
"url": "https://ubuntu.com/security/notices/USN-6681-2"
}
]
}
CERTFR-2024-AVI-0902
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Red Hat. Certaines d'entre elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, une atteinte à l'intégrité des données et un contournement de la politique de sécurité.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Red Hat | N/A | Red Hat Enterprise Linux for x86_64 9 x86_64 | ||
| Red Hat | N/A | Red Hat Enterprise Linux for Power, little endian 9 ppc64le | ||
| Red Hat | N/A | Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.4 ppc64le | ||
| Red Hat | N/A | Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.4 ppc64le | ||
| Red Hat | N/A | Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.4 x86_64 | ||
| Red Hat | N/A | Red Hat Enterprise Linux for Real Time for NFV for x86_64 - 4 years of updates 9.4 x86_64 | ||
| Red Hat | N/A | Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.2 x86_64 | ||
| Red Hat | N/A | Red Hat Enterprise Linux Server - AUS 8.6 x86_64 | ||
| Red Hat | N/A | Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 9.4 aarch64 | ||
| Red Hat | N/A | Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.4 x86_64 | ||
| Red Hat | N/A | Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.2 x86_64 | ||
| Red Hat | N/A | Red Hat Enterprise Linux Server - TUS 8.6 x86_64 | ||
| Red Hat | N/A | Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.4 s390x | ||
| Red Hat | N/A | Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 9.4 x86_64 | ||
| Red Hat | N/A | Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.4 aarch64 | ||
| Red Hat | N/A | Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 9.2 s390x | ||
| Red Hat | N/A | Red Hat Enterprise Linux Server - AUS 9.4 x86_64 | ||
| Red Hat | N/A | Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6 x86_64 | ||
| Red Hat | N/A | Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.2 ppc64le | ||
| Red Hat | N/A | Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.4 s390x | ||
| Red Hat | N/A | Red Hat Enterprise Linux for ARM 64 9 aarch64 | ||
| Red Hat | N/A | Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.2 ppc64le | ||
| Red Hat | N/A | Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6 ppc64le | ||
| Red Hat | N/A | Red Hat Enterprise Linux for Real Time 9 x86_64 | ||
| Red Hat | N/A | Red Hat Enterprise Linux for Real Time for x86_64 - 4 years of updates 9.2 x86_64 | ||
| Red Hat | N/A | Red Hat Enterprise Linux Server - AUS 9.2 x86_64 | ||
| Red Hat | N/A | Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 9.4 ppc64le | ||
| Red Hat | N/A | Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.2 aarch64 | ||
| Red Hat | N/A | Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.2 s390x | ||
| Red Hat | N/A | Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 9.2 aarch64 | ||
| Red Hat | N/A | Red Hat CodeReady Linux Builder for Power, little endian 9 ppc64le | ||
| Red Hat | N/A | Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 9.4 s390x | ||
| Red Hat | N/A | Red Hat Enterprise Linux for IBM z Systems 9 s390x | ||
| Red Hat | N/A | Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 9.2 x86_64 | ||
| Red Hat | N/A | Red Hat CodeReady Linux Builder for x86_64 9 x86_64 | ||
| Red Hat | N/A | Red Hat Enterprise Linux for Real Time for x86_64 - 4 years of updates 9.4 x86_64 | ||
| Red Hat | N/A | Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.2 s390x | ||
| Red Hat | N/A | Red Hat CodeReady Linux Builder for ARM 64 9 aarch64 | ||
| Red Hat | N/A | Red Hat CodeReady Linux Builder for IBM z Systems 9 s390x | ||
| Red Hat | N/A | Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.4 aarch64 | ||
| Red Hat | N/A | Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 9.2 ppc64le | ||
| Red Hat | N/A | Red Hat Enterprise Linux for Real Time for NFV 9 x86_64 | ||
| Red Hat | N/A | Red Hat Enterprise Linux for Real Time for NFV for x86_64 - 4 years of updates 9.2 x86_64 | ||
| Red Hat | N/A | Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.2 aarch64 |
| Title | Publication Time | Tags | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Red Hat Enterprise Linux for x86_64 9 x86_64",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian 9 ppc64le",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.4 ppc64le",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.4 ppc64le",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.4 x86_64",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time for NFV for x86_64 - 4 years of updates 9.4 x86_64",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.2 x86_64",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 8.6 x86_64",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 9.4 aarch64",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.4 x86_64",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.2 x86_64",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - TUS 8.6 x86_64",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.4 s390x",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 9.4 x86_64",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.4 aarch64",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 9.2 s390x",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 9.4 x86_64",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6 x86_64",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.2 ppc64le",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.4 s390x",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 9 aarch64",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.2 ppc64le",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6 ppc64le",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time 9 x86_64",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time for x86_64 - 4 years of updates 9.2 x86_64",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 9.2 x86_64",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 9.4 ppc64le",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.2 aarch64",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.2 s390x",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 9.2 aarch64",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for Power, little endian 9 ppc64le",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 9.4 s390x",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems 9 s390x",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 9.2 x86_64",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for x86_64 9 x86_64",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time for x86_64 - 4 years of updates 9.4 x86_64",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.2 s390x",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for ARM 64 9 aarch64",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for IBM z Systems 9 s390x",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.4 aarch64",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 9.2 ppc64le",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time for NFV 9 x86_64",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time for NFV for x86_64 - 4 years of updates 9.2 x86_64",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.2 aarch64",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-36889",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36889"
},
{
"name": "CVE-2024-42284",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42284"
},
{
"name": "CVE-2024-26830",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26830"
},
{
"name": "CVE-2023-28746",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28746"
},
{
"name": "CVE-2024-27403",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27403"
},
{
"name": "CVE-2024-38556",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38556"
},
{
"name": "CVE-2024-40959",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40959"
},
{
"name": "CVE-2024-41056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41056"
},
{
"name": "CVE-2024-26598",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26598"
},
{
"name": "CVE-2021-47560",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47560"
},
{
"name": "CVE-2021-47385",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47385"
},
{
"name": "CVE-2024-39502",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39502"
},
{
"name": "CVE-2024-42079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42079"
},
{
"name": "CVE-2024-39472",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39472"
},
{
"name": "CVE-2024-36978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36978"
},
{
"name": "CVE-2024-41066",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41066"
},
{
"name": "CVE-2024-42090",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42090"
},
{
"name": "CVE-2024-36244",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36244"
},
{
"name": "CVE-2024-42272",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42272"
},
{
"name": "CVE-2024-35989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35989"
},
{
"name": "CVE-2023-52658",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52658"
},
{
"name": "CVE-2024-35884",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35884"
},
{
"name": "CVE-2024-39483",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39483"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0902",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-10-18T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de Red Hat. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et un contournement de la politique de s\u00e9curit\u00e9.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Red Hat",
"vendor_advisories": [
{
"published_at": "2024-10-16",
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2024:8161",
"url": "https://access.redhat.com/errata/RHSA-2024:8161"
},
{
"published_at": "2024-10-16",
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2024:8157",
"url": "https://access.redhat.com/errata/RHSA-2024:8157"
},
{
"published_at": "2024-10-16",
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2024:8158",
"url": "https://access.redhat.com/errata/RHSA-2024:8158"
},
{
"published_at": "2024-10-16",
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2024:8162",
"url": "https://access.redhat.com/errata/RHSA-2024:8162"
}
]
}
SSA-613116
Vulnerability from csaf_siemens - Published: 2025-08-12 00:00 - Updated: 2026-02-12 00:00Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited. (TLPv2: TLP:CLEAR)",
"tlp": {
"label": "WHITE"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "SINEC OS before V3.1 contains third-party components with multiple vulnerabilities.\n\nSiemens has released new versions for the affected products and recommends to update to the latest versions.",
"title": "Summary"
},
{
"category": "general",
"text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity",
"title": "General Recommendations"
},
{
"category": "general",
"text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The use of Siemens Security Advisories is subject to the terms and conditions listed on: https://www.siemens.com/productcert/terms-of-use.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "productcert@siemens.com",
"name": "Siemens ProductCERT",
"namespace": "https://www.siemens.com"
},
"references": [
{
"category": "self",
"summary": "SSA-613116: Multiple Vulnerabilities in Third-Party Components in SINEC OS before V3.1 - HTML Version",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-613116.html"
},
{
"category": "self",
"summary": "SSA-613116: Multiple Vulnerabilities in Third-Party Components in SINEC OS before V3.1 - CSAF Version",
"url": "https://cert-portal.siemens.com/productcert/csaf/ssa-613116.json"
}
],
"title": "SSA-613116: Multiple Vulnerabilities in Third-Party Components in SINEC OS before V3.1",
"tracking": {
"current_release_date": "2026-02-12T00:00:00Z",
"generator": {
"engine": {
"name": "Siemens ProductCERT CSAF Generator",
"version": "1"
}
},
"id": "SSA-613116",
"initial_release_date": "2025-08-12T00:00:00Z",
"revision_history": [
{
"date": "2025-08-12T00:00:00Z",
"legacy_version": "1.0",
"number": "1",
"summary": "Publication Date"
},
{
"date": "2026-02-12T00:00:00Z",
"legacy_version": "1.1",
"number": "2",
"summary": "Corrected list of Affected Products and moved entries to Known Not Affected Products"
}
],
"status": "interim",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM RST2428P (6GK6242-6PA00)",
"product_id": "1",
"product_identification_helper": {
"model_numbers": [
"6GK6242-6PA00"
]
}
}
},
{
"category": "product_version_range",
"name": "vers:intdot/\u003c3.1",
"product": {
"name": "RUGGEDCOM RST2428P (6GK6242-6PA00)",
"product_id": "2",
"product_identification_helper": {
"model_numbers": [
"6GK6242-6PA00"
]
}
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RST2428P (6GK6242-6PA00)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE XC-300/XR-300/XC-400/XR-500WG/XR-500 family",
"product_id": "3"
}
}
],
"category": "product_name",
"name": "SCALANCE XC-300/XR-300/XC-400/XR-500WG/XR-500 family"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE XCM-/XRM-/XCH-/XRH-300 family",
"product_id": "4"
}
},
{
"category": "product_version_range",
"name": "vers:intdot/\u003c3.1",
"product": {
"name": "SCALANCE XCM-/XRM-/XCH-/XRH-300 family",
"product_id": "5"
}
}
],
"category": "product_name",
"name": "SCALANCE XCM-/XRM-/XCH-/XRH-300 family"
}
],
"category": "vendor",
"name": "Siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-44879",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In gc_data_segment in fs/f2fs/gc.c in the Linux kernel before 5.16.3, special files are not considered, leading to a move_data_page NULL pointer dereference.",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2021-44879"
},
{
"cve": "CVE-2022-48655",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfirmware: arm_scmi: Harden accesses to the reset domains\n\nAccessing reset domains descriptors by the index upon the SCMI drivers\nrequests through the SCMI reset operations interface can potentially\nlead to out-of-bound violations if the SCMI driver misbehave.\n\nAdd an internal consistency check before any such domains descriptors\naccesses.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2022-48655"
},
{
"cve": "CVE-2022-48772",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: lgdt3306a: Add a check against null-pointer-def\n\nThe driver should check whether the client provides the platform_data.\n\nThe following log reveals it:\n\n[ 29.610324] BUG: KASAN: null-ptr-deref in kmemdup+0x30/0x40\n[ 29.610730] Read of size 40 at addr 0000000000000000 by task bash/414\n[ 29.612820] Call Trace:\n[ 29.613030] \u003cTASK\u003e\n[ 29.613201] dump_stack_lvl+0x56/0x6f\n[ 29.613496] ? kmemdup+0x30/0x40\n[ 29.613754] print_report.cold+0x494/0x6b7\n[ 29.614082] ? kmemdup+0x30/0x40\n[ 29.614340] kasan_report+0x8a/0x190\n[ 29.614628] ? kmemdup+0x30/0x40\n[ 29.614888] kasan_check_range+0x14d/0x1d0\n[ 29.615213] memcpy+0x20/0x60\n[ 29.615454] kmemdup+0x30/0x40\n[ 29.615700] lgdt3306a_probe+0x52/0x310\n[ 29.616339] i2c_device_probe+0x951/0xa90",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0.0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2022-48772"
},
{
"cve": "CVE-2022-48935",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnetfilter: nf_tables: unregister flowtable hooks on netns exit",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2022-48935"
},
{
"cve": "CVE-2023-3567",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free flaw was found in vcs_read in drivers/tty/vt/vc_screen.c in vc_screen in the Linux Kernel. This issue may allow an attacker with local user access to cause a system crash or leak internal kernel information.",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-3567"
},
{
"cve": "CVE-2023-5178",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free vulnerability was found in drivers/nvme/target/tcp.c` in `nvmet_tcp_free_crypto` due to a logical bug in the NVMe-oF/TCP subsystem in the Linux kernel. This issue may allow a malicious local privileged user to cause a use-after-free and double-free problem, which may permit remote code execution or lead to local privilege escalation problem.",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-5178"
},
{
"cve": "CVE-2023-5678",
"cwe": {
"id": "CWE-606",
"name": "Unchecked Input for Loop Condition"
},
"notes": [
{
"category": "summary",
"text": "Issue summary: Generating excessively long X9.42 DH keys or checking excessively long X9.42 DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_generate_key() to generate an X9.42 DH key may experience long delays. Likewise, applications that use DH_check_pub_key(), DH_check_pub_key_ex() or EVP_PKEY_public_check() to check an X9.42 DH key or X9.42 DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. While DH_check() performs all the necessary checks (as of CVE-2023-3817), DH_check_pub_key() doesn\u0027t make any of these checks, and is therefore vulnerable for excessively large P and Q parameters. Likewise, while DH_generate_key() performs a check for an excessively large P, it doesn\u0027t check for an excessively large Q. An application that calls DH_generate_key() or DH_check_pub_key() and supplies a key or parameters obtained from an untrusted source could be vulnerable to a Denial of Service attack. DH_generate_key() and DH_check_pub_key() are also called by a number of other OpenSSL functions. An application calling any of those other functions may similarly be affected. The other functions affected by this are DH_check_pub_key_ex(), EVP_PKEY_public_check(), and EVP_PKEY_generate(). Also vulnerable are the OpenSSL pkey command line application when using the \"-pubcheck\" option, as well as the OpenSSL genpkey command line application. The OpenSSL SSL/TLS implementation is not affected by this issue. The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-5678"
},
{
"cve": "CVE-2023-5717",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "A heap out-of-bounds write vulnerability in the Linux kernel\u0027s Linux Kernel Performance Events (perf) component can be exploited to achieve local privilege escalation.\r\n\r\nIf perf_read_group() is called while an event\u0027s sibling_list is smaller than its child\u0027s sibling_list, it can increment or write to memory locations outside of the allocated buffer.\r\n\r\nWe recommend upgrading past commit 32671e3799ca2e4590773fd0e63aaa4229e50c06.",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-5717"
},
{
"cve": "CVE-2023-6040",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "An out-of-bounds access vulnerability involving netfilter was reported and fixed as: f1082dd31fe4 (netfilter: nf_tables: Reject tables of unsupported family); While creating a new netfilter table, lack of a safeguard against invalid nf_tables family (pf) values within `nf_tables_newtable` function enables an attacker to achieve out-of-bounds access.",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-6040"
},
{
"cve": "CVE-2023-6121",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "An out-of-bounds read vulnerability was found in the NVMe-oF/TCP subsystem in the Linux kernel. This issue may allow a remote attacker to send a crafted TCP packet, triggering a heap-based buffer overflow that results in kmalloc data being printed and potentially leaked to the kernel ring buffer (dmesg).",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-6121"
},
{
"cve": "CVE-2023-6606",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "An out-of-bounds read vulnerability was found in smbCalcSize in fs/smb/client/netmisc.c in the Linux Kernel. This issue could allow a local attacker to crash the system or leak internal kernel information.",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-6606"
},
{
"cve": "CVE-2023-6931",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "A heap out-of-bounds write vulnerability in the Linux kernel\u0027s Performance Events system component can be exploited to achieve local privilege escalation.\n\nA perf_event\u0027s read_size can overflow, leading to an heap out-of-bounds increment or write in perf_read_group().\n\nWe recommend upgrading past commit 382c27f4ed28f803b1f1473ac2d8db0afc795a1b.",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-6931"
},
{
"cve": "CVE-2023-6932",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free vulnerability in the Linux kernel\u0027s ipv4: igmp component can be exploited to achieve local privilege escalation.\n\nA race condition can be exploited to cause a timer be mistakenly registered on a RCU read locked object which is freed by another thread.\n\nWe recommend upgrading past commit e2b706c691905fe78468c361aaabc719d0a496f1.",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-6932"
},
{
"cve": "CVE-2023-35827",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in the Linux kernel through 6.3.8. A use-after-free was found in ravb_remove in drivers/net/ethernet/renesas/ravb_main.c.",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-35827"
},
{
"cve": "CVE-2023-39198",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A race condition was found in the QXL driver in the Linux kernel. The qxl_mode_dumb_create() function dereferences the qobj returned by the qxl_gem_object_create_with_handle(), but the handle is the only one holding a reference to it. This flaw allows an attacker to guess the returned handle value and trigger a use-after-free issue, potentially leading to a denial of service or privilege escalation.",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-39198"
},
{
"cve": "CVE-2023-45863",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in lib/kobject.c in the Linux kernel before 6.2.3. With root access, an attacker can trigger a race condition that results in a fill_kobj_path out-of-bounds write.",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-45863"
},
{
"cve": "CVE-2023-46343",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel before 6.5.9, there is a NULL pointer dereference in send_acknowledge in net/nfc/nci/spi.c.",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-46343"
},
{
"cve": "CVE-2023-51779",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "bt_sock_recvmsg in net/bluetooth/af_bluetooth.c in the Linux kernel through 6.6.8 has a use-after-free because of a bt_sock_ioctl race condition.",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-51779"
},
{
"cve": "CVE-2023-51780",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in the Linux kernel before 6.6.8. do_vcc_ioctl in net/atm/ioctl.c has a use-after-free because of a vcc_recvmsg race condition.",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-51780"
},
{
"cve": "CVE-2023-51781",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in the Linux kernel before 6.6.8. atalk_ioctl in net/appletalk/ddp.c has a use-after-free because of an atalk_recvmsg race condition.",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-51781"
},
{
"cve": "CVE-2023-51782",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in the Linux kernel before 6.6.8. rose_ioctl in net/rose/af_rose.c has a use-after-free because of a rose_accept race condition.",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-51782"
},
{
"cve": "CVE-2023-52340",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "summary",
"text": "The IPv6 implementation in the Linux kernel before 6.3 has a net/ipv6/route.c max_size threshold that can be consumed easily, e.g., leading to a denial of service (network is unreachable errors) when IPv6 packets are sent in a loop via a raw socket.",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52340"
},
{
"cve": "CVE-2023-52433",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnetfilter: nft_set_rbtree: skip sync GC for new elements in this transaction",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52433"
},
{
"cve": "CVE-2023-52435",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnet: prevent mss overflow in skb_segment()",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52435"
},
{
"cve": "CVE-2023-52475",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nInput: powermate - fix use-after-free in powermate_config_complete",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52475"
},
{
"cve": "CVE-2023-52477",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nusb: hub: Guard against accesses to uninitialized BOS descriptors",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52477"
},
{
"cve": "CVE-2023-52478",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nHID: logitech-hidpp: Fix kernel crash on receiver USB disconnect",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52478"
},
{
"cve": "CVE-2023-52486",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ndrm: Don\u0027t unref the same fb many times by mistake due to deadlock handling",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52486"
},
{
"cve": "CVE-2023-52502",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnet: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn()",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52502"
},
{
"cve": "CVE-2023-52504",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nx86/alternatives: Disable KASAN in apply_alternatives()",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52504"
},
{
"cve": "CVE-2023-52507",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnfc: nci: assert requested protocol is valid",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52507"
},
{
"cve": "CVE-2023-52509",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nravb: Fix use-after-free issue in ravb_tx_timeout_work()",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52509"
},
{
"cve": "CVE-2023-52510",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nieee802154: ca8210: Fix a potential UAF in ca8210_probe",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52510"
},
{
"cve": "CVE-2023-52581",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnetfilter: nf_tables: fix memleak when more than 255 elements expired",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52581"
},
{
"cve": "CVE-2023-52583",
"cwe": {
"id": "CWE-833",
"name": "Deadlock"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nceph: fix deadlock or deadcode of misusing dget()",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52583"
},
{
"cve": "CVE-2023-52587",
"cwe": {
"id": "CWE-413",
"name": "Improper Resource Locking"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nIB/ipoib: Fix mcast list locking",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52587"
},
{
"cve": "CVE-2023-52594",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nwifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus()",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52594"
},
{
"cve": "CVE-2023-52595",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nwifi: rt2x00: restart beacon queue when hardware reset",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52595"
},
{
"cve": "CVE-2023-52597",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nKVM: s390: fix setting of fpc register",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52597"
},
{
"cve": "CVE-2023-52598",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ns390/ptrace: handle setting of fpc register correctly",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52598"
},
{
"cve": "CVE-2023-52599",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\njfs: fix array-index-out-of-bounds in diNewExt",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52599"
},
{
"cve": "CVE-2023-52600",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\njfs: fix uaf in jfs_evict_inode",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52600"
},
{
"cve": "CVE-2023-52601",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\njfs: fix array-index-out-of-bounds in dbAdjTree",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52601"
},
{
"cve": "CVE-2023-52602",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\njfs: fix slab-out-of-bounds Read in dtSearch",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52602"
},
{
"cve": "CVE-2023-52603",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nUBSAN: array-index-out-of-bounds in dtSplitRoot",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52603"
},
{
"cve": "CVE-2023-52604",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nFS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52604"
},
{
"cve": "CVE-2023-52606",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\npowerpc/lib: Validate size for vector operations",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52606"
},
{
"cve": "CVE-2023-52607",
"cwe": {
"id": "CWE-395",
"name": "Use of NullPointerException Catch to Detect NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\npowerpc/mm: Fix null-pointer dereference in pgtable_cache_add",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52607"
},
{
"cve": "CVE-2023-52615",
"cwe": {
"id": "CWE-833",
"name": "Deadlock"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nhwrng: core - Fix page fault dead lock on mmap-ed hwrng",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52615"
},
{
"cve": "CVE-2023-52617",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nPCI: switchtec: Fix stdev_release() crash after surprise hot remove",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52617"
},
{
"cve": "CVE-2023-52619",
"cwe": {
"id": "CWE-99",
"name": "Improper Control of Resource Identifiers (\u0027Resource Injection\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\npstore/ram: Fix crash when setting number of cpus to an odd number",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52619"
},
{
"cve": "CVE-2023-52622",
"cwe": {
"id": "CWE-131",
"name": "Incorrect Calculation of Buffer Size"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: ext4: avoid online resizing failures due to oversized flex bg.",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52622"
},
{
"cve": "CVE-2023-52623",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nSUNRPC: Fix a suspicious RCU usage warning",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52623"
},
{
"cve": "CVE-2023-52637",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ncan: j1939: Fix UAF in j1939_sk_match_filter during setsockopt(SO_J1939_FILTER)",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52637"
},
{
"cve": "CVE-2023-52654",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nio_uring/af_unix: disable sending io_uring over sockets",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52654"
},
{
"cve": "CVE-2023-52655",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nusb: aqc111: check packet for fixup for true limit",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52655"
},
{
"cve": "CVE-2023-52670",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nrpmsg: virtio: Free driver_override when rpmsg_remove()",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52670"
},
{
"cve": "CVE-2023-52753",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ndrm/amd/display: Avoid NULL dereference of timing generator",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52753"
},
{
"cve": "CVE-2023-52764",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nmedia: gspca: cpia1: shift-out-of-bounds in set_flicker",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52764"
},
{
"cve": "CVE-2023-52774",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ns390/dasd: protect device queue against concurrent access",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52774"
},
{
"cve": "CVE-2023-52784",
"cwe": {
"id": "CWE-99",
"name": "Improper Control of Resource Identifiers (\u0027Resource Injection\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nbonding: stop the device in bond_setup_by_slave()",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52784"
},
{
"cve": "CVE-2023-52789",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ntty: vcc: Add check for kstrdup() in vcc_probe()",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52789"
},
{
"cve": "CVE-2023-52791",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ni2c: core: Run atomic i2c xfer when !preemptible",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52791"
},
{
"cve": "CVE-2023-52796",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nipvlan: add ipvlan_route_v6_outbound() helper",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52796"
},
{
"cve": "CVE-2023-52799",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\njfs: fix array-index-out-of-bounds in dbFindLeaf",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52799"
},
{
"cve": "CVE-2023-52804",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nfs/jfs: Add validity check for db_maxag and db_agpref",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52804"
},
{
"cve": "CVE-2023-52805",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\njfs: fix array-index-out-of-bounds in diAlloc",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52805"
},
{
"cve": "CVE-2023-52806",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nALSA: hda: Fix possible null-ptr-deref when assigning a stream",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52806"
},
{
"cve": "CVE-2023-52809",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nscsi: libfc: Fix potential NULL pointer dereference in fc_lport_ptp_setup()",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52809"
},
{
"cve": "CVE-2023-52810",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nfs/jfs: Add check for negative db_l2nbperpage",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52810"
},
{
"cve": "CVE-2023-52813",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ncrypto: pcrypt - Fix hungtask for PADATA_RESET",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52813"
},
{
"cve": "CVE-2023-52817",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ndrm/amdgpu: Fix a null pointer access when the smc_rreg pointer is NULL",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52817"
},
{
"cve": "CVE-2023-52818",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ndrm/amd: Fix UBSAN array-index-out-of-bounds for SMU7",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52818"
},
{
"cve": "CVE-2023-52819",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ndrm/amd: Fix UBSAN array-index-out-of-bounds for Polaris and Tonga",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52819"
},
{
"cve": "CVE-2023-52832",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nwifi: mac80211: don\u0027t return unset power in ieee80211_get_tx_power()",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52832"
},
{
"cve": "CVE-2023-52835",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nperf/core: Bail out early if the request AUX area is out of bound",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52835"
},
{
"cve": "CVE-2023-52836",
"cwe": {
"id": "CWE-99",
"name": "Improper Control of Resource Identifiers (\u0027Resource Injection\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nlocking/ww_mutex/test: Fix potential workqueue corruption",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52836"
},
{
"cve": "CVE-2023-52838",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nfbdev: imsttfb: fix a resource leak in probe",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52838"
},
{
"cve": "CVE-2023-52840",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nInput: synaptics-rmi4 - fix use after free in rmi_unregister_function()",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52840"
},
{
"cve": "CVE-2023-52843",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nllc: verify mac len before reading mac header",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52843"
},
{
"cve": "CVE-2023-52845",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ntipc: Change nla_policy for bearer-related names to NLA_NUL_STRING",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52845"
},
{
"cve": "CVE-2023-52847",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nmedia: bttv: fix use after free error due to btv-\u003etimeout timer",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52847"
},
{
"cve": "CVE-2023-52853",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nhid: cp2112: Fix duplicate workqueue initialization",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52853"
},
{
"cve": "CVE-2023-52855",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nusb: dwc2: fix possible NULL pointer dereference caused by driver concurrency",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52855"
},
{
"cve": "CVE-2023-52858",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nclk: mediatek: clk-mt7629: Add check for mtk_alloc_clk_data",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52858"
},
{
"cve": "CVE-2023-52864",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nplatform/x86: wmi: Fix opening of char device",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52864"
},
{
"cve": "CVE-2023-52865",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nclk: mediatek: clk-mt6797: Add check for mtk_alloc_clk_data",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52865"
},
{
"cve": "CVE-2023-52867",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ndrm/radeon: possible buffer overflow",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52867"
},
{
"cve": "CVE-2023-52868",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nthermal: core: prevent potential string overflow",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52868"
},
{
"cve": "CVE-2023-52871",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nsoc: qcom: llcc: Handle a second device without data corruption",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52871"
},
{
"cve": "CVE-2023-52873",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nclk: mediatek: clk-mt6779: Add check for mtk_alloc_clk_data",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52873"
},
{
"cve": "CVE-2023-52875",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nclk: mediatek: clk-mt2701: Add check for mtk_alloc_clk_data",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52875"
},
{
"cve": "CVE-2023-52876",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nclk: mediatek: clk-mt7629-eth: Add check for mtk_alloc_clk_data",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52876"
},
{
"cve": "CVE-2023-52879",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ntracing: Have trace_event_file have ref counters",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52879"
},
{
"cve": "CVE-2023-52881",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ntcp: do not accept ACK of bytes we never sent",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52881"
},
{
"cve": "CVE-2023-52882",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nclk: sunxi-ng: h6: Reparent CPUX during PLL CPUX rate change\n\nWhile PLL CPUX clock rate change when CPU is running from it works in\nvast majority of cases, now and then it causes instability. This leads\nto system crashes and other undefined behaviour. After a lot of testing\n(30+ hours) while also doing a lot of frequency switches, we can\u0027t\nobserve any instability issues anymore when doing reparenting to stable\nclock like 24 MHz oscillator.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0.0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2023-52882"
},
{
"cve": "CVE-2023-52887",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "net: can: j1939: vulnerability related to error handling for closely received RTS messages in xtp_rx_rts_session_new, which is addressed by replacing less informative backtraces with a new method that provides clearer error messages and allows for early termination of problematic sessions.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2023-52887"
},
{
"cve": "CVE-2023-52918",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: pci: cx23885: check cx23885_vdev_init() return\n\ncx23885_vdev_init() can return a NULL pointer, but that pointer\nis used in the next line without a check.\n\nAdd a NULL pointer check and go to the error unwind if it is NULL.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0.0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2023-52918"
},
{
"cve": "CVE-2023-52919",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnfc: nci: fix possible NULL pointer dereference in send_acknowledge()",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52919"
},
{
"cve": "CVE-2024-0193",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free flaw was found in the netfilter subsystem of the Linux kernel. If the catchall element is garbage-collected when the pipapo set is removed, the element can be deactivated twice. This can cause a use-after-free issue on an NFT_CHAIN object or NFT_OBJECT object, allowing a local unprivileged user with CAP_NET_ADMIN capability to escalate their privileges on the system.",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-0193"
},
{
"cve": "CVE-2024-0584",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free issue was found in igmp_start_timer in net/ipv4/igmp.c in the network sub-component in the Linux Kernel. This flaw allows a local user to observe a refcnt use-after-free issue when receiving an igmp query packet, leading to a kernel information leak.",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-0584"
},
{
"cve": "CVE-2024-0646",
"cwe": {
"id": "CWE-1314",
"name": "Missing Write Protection for Parametric Data Values"
},
"notes": [
{
"category": "summary",
"text": "An out-of-bounds memory write flaw was found in the Linux kernel\u2019s Transport Layer Security functionality in how a user calls a function splice with a ktls socket as the destination. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-0646"
},
{
"cve": "CVE-2024-0841",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "A null pointer dereference flaw was found in the hugetlbfs_fill_super function in the Linux kernel hugetlbfs (HugeTLB pages) functionality. This issue may allow a local user to crash the system or potentially escalate their privileges on the system.",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-0841"
},
{
"cve": "CVE-2024-1086",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free vulnerability in the Linux kernel\u0027s netfilter: nf_tables component can be exploited to achieve local privilege escalation.\r\n\r\nThe nft_verdict_init() function allows positive values as drop error within the hook verdict, and hence the nf_hook_slow() function can cause a double free vulnerability when NF_DROP is issued with a drop error which resembles NF_ACCEPT.",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-1086"
},
{
"cve": "CVE-2024-2511",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "summary",
"text": "Some non-default TLS server configurations can cause unbounded memory growth when processing TLSv1.3 sessions. An attacker may exploit certain server configurations to trigger unbounded memory growth that would lead to a Denial of Service This problem can occur in TLSv1.3 if the non-default SSL_OP_NO_TICKET option is being used (but not if early_data support is also configured and the default anti-replay protection is in use). In this case, under certain conditions, the session cache can get into an incorrect state and it will fail to flush properly as it fills. The session cache will continue to grow in an unbounded manner. A malicious client could deliberately create the scenario for this failure to force a Denial of Service. It may also happen by accident in normal operation. This issue only affects TLS servers supporting TLSv1.3. It does not affect TLS clients. The FIPS modules in 3.2, 3.1 and 3.0 are not affected by this issue. OpenSSL 1.0.2 is also not affected by this issue.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-2511"
},
{
"cve": "CVE-2024-4603",
"cwe": {
"id": "CWE-834",
"name": "Excessive Iteration"
},
"notes": [
{
"category": "summary",
"text": "Checking excessively long DSA keys or parameters may be very slow. Applications that use the functions EVP_PKEY_param_check() or EVP_PKEY_public_check() to check a DSA public key or DSA parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. The functions EVP_PKEY_param_check() or EVP_PKEY_public_check() perform various checks on DSA parameters. Some of those computations take a long time if the modulus (`p` parameter) is too large. Trying to use a very large modulus is slow and OpenSSL will not allow using public keys with a modulus which is over 10,000 bits in length for signature verification. However the key and parameter check functions do not limit the modulus size when performing the checks. An application that calls EVP_PKEY_param_check() or EVP_PKEY_public_check() and supplies a key or parameters obtained from an untrusted source could be vulnerable to a Denial of Service attack. These functions are not called by OpenSSL itself on untrusted DSA keys so only applications that directly call these functions may be vulnerable. Also vulnerable are the OpenSSL pkey and pkeyparam command line applications when using the `-check` option. The OpenSSL SSL/TLS implementation is not affected by this issue. The OpenSSL 3.0 and 3.1 FIPS providers are affected by this issue.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-4603"
},
{
"cve": "CVE-2024-4741",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "Calling the OpenSSL API function SSL_free_buffers may cause memory to be accessed that was previously freed in some situations",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-4741"
},
{
"cve": "CVE-2024-5535",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "summary",
"text": "Issue summary: Calling the OpenSSL API function SSL_select_next_proto with an empty supported client protocols buffer may cause a crash or memory contents to be sent to the peer. Impact summary: A buffer overread can have a range of potential consequences such as unexpected application beahviour or a crash. In particular this issue could result in up to 255 bytes of arbitrary private data from memory being sent to the peer leading to a loss of confidentiality. However, only applications that directly call the SSL_select_next_proto function with a 0 length list of supported client protocols are affected by this issue. This would normally never be a valid scenario and is typically not under attacker control but may occur by accident in the case of a configuration or programming error in the calling application. The OpenSSL API function SSL_select_next_proto is typically used by TLS applications that support ALPN (Application Layer Protocol Negotiation) or NPN (Next Protocol Negotiation). NPN is older, was never standardised and is deprecated in favour of ALPN. We believe that ALPN is significantly more widely deployed than NPN. The SSL_select_next_proto function accepts a list of protocols from the server and a list of protocols from the client and returns the first protocol that appears in the server list that also appears in the client list. In the case of no overlap between the two lists it returns the first item in the client list. In either case it will signal whether an overlap between the two lists was found. In the case where SSL_select_next_proto is called with a zero length client list it fails to notice this condition and returns the memory immediately following the client list pointer (and reports that there was no overlap in the lists). This function is typically called from a server side application callback for ALPN or a client side application callback for NPN. In the case of ALPN the list of protocols supplied by the client is guaranteed by libssl to never be zero in length. The list of server protocols comes from the application and should never normally be expected to be of zero length. In this case if the SSL_select_next_proto function has been called as expected (with the list supplied by the client passed in the client/client_len parameters), then the application will not be vulnerable to this issue. If the application has accidentally been configured with a zero length server list, and has accidentally passed that zero length server list in the client/client_len parameters, and has additionally failed to correctly handle a \"no overlap\" response (which would normally result in a handshake failure in ALPN) then it will be vulnerable to this problem. In the case of NPN, the protocol permits the client to opportunistically select a protocol when there is no overlap. OpenSSL returns the first client protocol in the no overlap case in support of this. The list of client protocols comes from the application and should never normally be expected to be of zero length. However if the SSL_select_next_proto function is accidentally called with a client_len of 0 then an invalid memory pointer will be returned instead. If the application uses this output as the opportunistic protocol then the loss of confidentiality will occur. This issue has been assessed as Low severity because applications are most likely to be vulnerable if they are using NPN instead of ALPN - but NPN is not widely used. It also requires an application configuration or programming error. Finally, this issue would not typically be under attacker control making active exploitation unlikely. The FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue. Due to the low severity of this issue we are not issuing new releases of OpenSSL at this time. The fix will be included in the next releases when they become available.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-5535"
},
{
"cve": "CVE-2024-6119",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"notes": [
{
"category": "summary",
"text": "Applications performing certificate name checks (e.g., TLS clients checking server certificates) may attempt to read an invalid memory address resulting in abnormal termination of the application process. Impact summary: Abnormal termination of an application can a cause a denial of service. Applications performing certificate name checks (e.g., TLS clients checking server certificates) may attempt to read an invalid memory address when comparing the expected name with an `otherName` subject alternative name of an X.509 certificate. This may result in an exception that terminates the application program. Note that basic certificate chain validation (signatures, dates, ...) is not affected, the denial of service can occur only when the application also specifies an expected DNS name, Email address or IP address. TLS servers rarely solicit client certificates, and even when they do, they generally don\u0027t perform a name check against a reference identifier (expected identity), but rather extract the presented identity after checking the certificate chain. So TLS servers are generally not affected and the severity of the issue is Moderate. The FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-6119"
},
{
"cve": "CVE-2024-6232",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"notes": [
{
"category": "summary",
"text": "There is a MEDIUM severity vulnerability affecting CPython.\n\n\n\n\n\nRegular expressions that allowed excessive backtracking during tarfile.TarFile header parsing are vulnerable to ReDoS via specifically-crafted tar archives.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-6232"
},
{
"cve": "CVE-2024-25741",
"cwe": {
"id": "CWE-703",
"name": "Improper Check or Handling of Exceptional Conditions"
},
"notes": [
{
"category": "summary",
"text": "printer_write in drivers/usb/gadget/function/f_printer.c in the Linux kernel through 6.7.4 does not properly call usb_ep_queue, which might allow attackers to cause a denial of service or have unspecified other impact.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-25741"
},
{
"cve": "CVE-2024-26581",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnetfilter: nft_set_rbtree: skip end interval element from gc",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-26581"
},
{
"cve": "CVE-2024-26593",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ni2c: i801: Fix block process call transactions",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-26593"
},
{
"cve": "CVE-2024-26598",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nKVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-26598"
},
{
"cve": "CVE-2024-26600",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nphy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-26600"
},
{
"cve": "CVE-2024-26602",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nsched/membarrier: reduce the ability to hammer on sys_membarrier",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-26602"
},
{
"cve": "CVE-2024-26606",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nbinder: signal epoll threads of self-work",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-26606"
},
{
"cve": "CVE-2024-26615",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnet/smc: fix illegal rmb_desc access in SMC-D connection dump",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-26615"
},
{
"cve": "CVE-2024-26625",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nllc: call sock_orphan() at release time",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-26625"
},
{
"cve": "CVE-2024-26635",
"cwe": {
"id": "CWE-456",
"name": "Missing Initialization of a Variable"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nllc: Drop support for ETH_P_TR_802_2.",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-26635"
},
{
"cve": "CVE-2024-26636",
"cwe": {
"id": "CWE-413",
"name": "Improper Resource Locking"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nllc: make llc_ui_sendmsg() more robust against bonding changes",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-26636"
},
{
"cve": "CVE-2024-26645",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: tracing: Ensure visibility when inserting an element into tracing_map.",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-26645"
},
{
"cve": "CVE-2024-26663",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ntipc: Check the bearer type before calling tipc_udp_nl_bearer_add()",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-26663"
},
{
"cve": "CVE-2024-26664",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nhwmon: (coretemp) Fix out-of-bounds memory access",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-26664"
},
{
"cve": "CVE-2024-26671",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: blk-mq: fix IO hang from sbitmap wakeup race.",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-26671"
},
{
"cve": "CVE-2024-26673",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnetfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-26673"
},
{
"cve": "CVE-2024-26675",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nppp_async: limit MRU to 64K",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-26675"
},
{
"cve": "CVE-2024-26679",
"cwe": {
"id": "CWE-413",
"name": "Improper Resource Locking"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ninet: read sk-\u003esk_family once in inet_recv_error()",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-26679"
},
{
"cve": "CVE-2024-26684",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnet: stmmac: xgmac: fix handling of DPP safety error for DMA channels",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-26684"
},
{
"cve": "CVE-2024-26685",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnilfs2: fix potential bug in end_buffer_async_write",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-26685"
},
{
"cve": "CVE-2024-26688",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nfs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-26688"
},
{
"cve": "CVE-2024-26696",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnilfs2: fix hang in nilfs_lookup_dirty_data_buffers()",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-26696"
},
{
"cve": "CVE-2024-26697",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnilfs2: fix data corruption in dsync block recovery for small block sizes",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-26697"
},
{
"cve": "CVE-2024-26702",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\niio: magnetometer: rm3100: add boundary check for the value read from RM3100_REG_TMRC",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-26702"
},
{
"cve": "CVE-2024-26704",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\next4: fix double-free of blocks due to wrong extents moved_len",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-26704"
},
{
"cve": "CVE-2024-26720",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nmm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-26720"
},
{
"cve": "CVE-2024-26722",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nASoC: rt5645: Fix deadlock in rt5645_jack_detect_work()",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-26722"
},
{
"cve": "CVE-2024-26735",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nipv6: sr: fix possible use-after-free and null-ptr-deref",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-26735"
},
{
"cve": "CVE-2024-26736",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nafs: Increase buffer size in afs_update_volume_status()",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-26736"
},
{
"cve": "CVE-2024-26748",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nusb: cdns3: fix memory double free when handle zero packet",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-26748"
},
{
"cve": "CVE-2024-26749",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nusb: cdns3: fixed memory use after free at cdns3_gadget_ep_disable()",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-26749"
},
{
"cve": "CVE-2024-26751",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nARM: ep93xx: Add terminator to gpiod_lookup_table",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-26751"
},
{
"cve": "CVE-2024-26752",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nl2tp: pass correct message length to ip6_append_data",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-26752"
},
{
"cve": "CVE-2024-26754",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ngtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp()",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-26754"
},
{
"cve": "CVE-2024-26763",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ndm-crypt: don\u0027t modify the data when using authenticated encryption",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-26763"
},
{
"cve": "CVE-2024-26764",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nfs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-26764"
},
{
"cve": "CVE-2024-26766",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nIB/hfi1: Fix sdma.h tx-\u003enum_descs off-by-one error",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-26766"
},
{
"cve": "CVE-2024-26772",
"cwe": {
"id": "CWE-413",
"name": "Improper Resource Locking"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\next4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal()\r\n\r\nPlaces the logic for checking if the group\u0027s block bitmap is corrupt under\r\nthe protection of the group lock to avoid allocating blocks from the group\r\nwith a corrupted block bitmap.",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-26772"
},
{
"cve": "CVE-2024-26773",
"cwe": {
"id": "CWE-413",
"name": "Improper Resource Locking"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found().",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-26773"
},
{
"cve": "CVE-2024-26777",
"cwe": {
"id": "CWE-369",
"name": "Divide By Zero"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nfbdev: sis: Error out if pixclock equals zero",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-26777"
},
{
"cve": "CVE-2024-26778",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nfbdev: savage: Error out if pixclock equals zero",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-26778"
},
{
"cve": "CVE-2024-26779",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nwifi: mac80211: fix race condition on enabling fast-xmit",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-26779"
},
{
"cve": "CVE-2024-26788",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ndmaengine: fsl-qdma: init irq after reg initialization",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-26788"
},
{
"cve": "CVE-2024-26790",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ndmaengine: fsl-qdma: fix SoC may hang on 16 byte unaligned read",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-26790"
},
{
"cve": "CVE-2024-26791",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nbtrfs: dev-replace: properly validate device names",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-26791"
},
{
"cve": "CVE-2024-26793",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ngtp: fix use-after-free and null-ptr-deref in gtp_newlink()",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-26793"
},
{
"cve": "CVE-2024-26801",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nBluetooth: Avoid potential use-after-free in hci_error_reset",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-26801"
},
{
"cve": "CVE-2024-26804",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnet: ip_tunnel: prevent perpetual headroom growth",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-26804"
},
{
"cve": "CVE-2024-26805",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: netlink: Fix kernel-infoleak-after-free in skb_datagram_iter.",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-26805"
},
{
"cve": "CVE-2024-26825",
"cwe": {
"id": "CWE-402",
"name": "Transmission of Private Resources into a New Sphere (\u0027Resource Leak\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnfc: nci: free rx_data_reassembly skb on NCI device cleanup",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-26825"
},
{
"cve": "CVE-2024-26835",
"cwe": {
"id": "CWE-459",
"name": "Incomplete Cleanup"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnetfilter: nf_tables: set dormant flag on hook register failure",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-26835"
},
{
"cve": "CVE-2024-26839",
"cwe": {
"id": "CWE-402",
"name": "Transmission of Private Resources into a New Sphere (\u0027Resource Leak\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nIB/hfi1: Fix a memleak in init_credit_return",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-26839"
},
{
"cve": "CVE-2024-26840",
"cwe": {
"id": "CWE-402",
"name": "Transmission of Private Resources into a New Sphere (\u0027Resource Leak\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ncachefiles: fix memory leak in cachefiles_add_cache()",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-26840"
},
{
"cve": "CVE-2024-26845",
"cwe": {
"id": "CWE-99",
"name": "Improper Control of Resource Identifiers (\u0027Resource Injection\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nscsi: target: core: Add TMF to tmr_list handling",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-26845"
},
{
"cve": "CVE-2024-26900",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmd: fix kmemleak of rdev-\u003eserial\n\nIf kobject_add() is fail in bind_rdev_to_array(), \u0027rdev-\u003eserial\u0027 will be\nalloc not be freed, and kmemleak occurs.\n\nunreferenced object 0xffff88815a350000 (size 49152):\n comm \"mdadm\", pid 789, jiffies 4294716910\n hex dump (first 32 bytes):\n 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\n 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\n backtrace (crc f773277a):\n [\u003c0000000058b0a453\u003e] kmemleak_alloc+0x61/0xe0\n [\u003c00000000366adf14\u003e] __kmalloc_large_node+0x15e/0x270\n [\u003c000000002e82961b\u003e] __kmalloc_node.cold+0x11/0x7f\n [\u003c00000000f206d60a\u003e] kvmalloc_node+0x74/0x150\n [\u003c0000000034bf3363\u003e] rdev_init_serial+0x67/0x170\n [\u003c0000000010e08fe9\u003e] mddev_create_serial_pool+0x62/0x220\n [\u003c00000000c3837bf0\u003e] bind_rdev_to_array+0x2af/0x630\n [\u003c0000000073c28560\u003e] md_add_new_disk+0x400/0x9f0\n [\u003c00000000770e30ff\u003e] md_ioctl+0x15bf/0x1c10\n [\u003c000000006cfab718\u003e] blkdev_ioctl+0x191/0x3f0\n [\u003c0000000085086a11\u003e] vfs_ioctl+0x22/0x60\n [\u003c0000000018b656fe\u003e] __x64_sys_ioctl+0xba/0xe0\n [\u003c00000000e54e675e\u003e] do_syscall_64+0x71/0x150\n [\u003c000000008b0ad622\u003e] entry_SYSCALL_64_after_hwframe+0x6c/0x74",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0.0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-26900"
},
{
"cve": "CVE-2024-26910",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnetfilter: ipset: fix performance regression in swap operation",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-26910"
},
{
"cve": "CVE-2024-26923",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: af_unix: Fix garbage collector racing against connect().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-26923"
},
{
"cve": "CVE-2024-26924",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nft_set_pipapo: do not free live element\n\nPablo reports a crash with large batches of elements with a\nback-to-back add/remove pattern. Quoting Pablo:\n\n add_elem(\"00000000\") timeout 100 ms\n ...\n add_elem(\"0000000X\") timeout 100 ms\n del_elem(\"0000000X\") \u003c---------------- delete one that was just added\n ...\n add_elem(\"00005000\") timeout 100 ms\n\n 1) nft_pipapo_remove() removes element 0000000X\n Then, KASAN shows a splat.\n\nLooking at the remove function there is a chance that we will drop a\nrule that maps to a non-deactivated element.\n\nRemoval happens in two steps, first we do a lookup for key k and return the\nto-be-removed element and mark it as inactive in the next generation.\nThen, in a second step, the element gets removed from the set/map.\n\nThe _remove function does not work correctly if we have more than one\nelement that share the same key.\n\nThis can happen if we insert an element into a set when the set already\nholds an element with same key, but the element mapping to the existing\nkey has timed out or is not active in the next generation.\n\nIn such case its possible that removal will unmap the wrong element.\nIf this happens, we will leak the non-deactivated element, it becomes\nunreachable.\n\nThe element that got deactivated (and will be freed later) will\nremain reachable in the set data structure, this can result in\na crash when such an element is retrieved during lookup (stale\npointer).\n\nAdd a check that the fully matching key does in fact map to the element\nthat we have marked as inactive in the deactivation step.\nIf not, we need to continue searching.\n\nAdd a bug/warn trap at the end of the function as well, the remove\nfunction must not ever be called with an invisible/unreachable/non-existent\nelement.\n\nv2: avoid uneeded temporary variable (Stefano)",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-26924"
},
{
"cve": "CVE-2024-26926",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbinder: check offset alignment in binder_get_object()\n\nCommit 6d98eb95b450 (\"binder: avoid potential data leakage when copying\ntxn\") introduced changes to how binder objects are copied. In doing so,\nit unintentionally removed an offset alignment check done through calls\nto binder_alloc_copy_from_buffer() -\u003e check_buffer().\n\nThese calls were replaced in binder_get_object() with copy_from_user(),\nso now an explicit offset alignment check is needed here. This avoids\nlater complications when unwinding the objects gets harder.\n\nIt is worth noting this check existed prior to commit 7a67a39320df\n(\"binder: add function to copy binder object from buffer\"), likely\nremoved due to redundancy at the time.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0.0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-26926"
},
{
"cve": "CVE-2024-26988",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ninit/main.c: Fix potential static_command_line memory overflow",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-26988"
},
{
"cve": "CVE-2024-26993",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nfs: sysfs: Fix reference leak in sysfs_break_active_protection()",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-26993"
},
{
"cve": "CVE-2024-26994",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nspeakup: Avoid crash on very long word\n\nIn case a console is set up really large and contains a really long word\n(\u003e 256 characters), we have to stop before the length of the word buffer.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-26994"
},
{
"cve": "CVE-2024-26997",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: dwc2: host: Fix dereference issue in DDMA completion flow.\n\nFixed variable dereference issue in DDMA completion flow.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0.0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-26997"
},
{
"cve": "CVE-2024-26999",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nserial/pmac_zilog: Remove flawed mitigation for rx irq flood\n\nThe mitigation was intended to stop the irq completely. That may be\nbetter than a hard lock-up but it turns out that you get a crash anyway\nif you\u0027re using pmac_zilog as a serial console:\n\nttyPZ0: pmz: rx irq flood !\nBUG: spinlock recursion on CPU#0, swapper/0\n\nThat\u0027s because the pr_err() call in pmz_receive_chars() results in\npmz_console_write() attempting to lock a spinlock already locked in\npmz_interrupt(). With CONFIG_DEBUG_SPINLOCK=y, this produces a fatal\nBUG splat. The spinlock in question is the one in struct uart_port.\n\nEven when it\u0027s not fatal, the serial port rx function ceases to work.\nAlso, the iteration limit doesn\u0027t play nicely with QEMU, as can be\nseen in the bug report linked below.\n\nA web search for other reports of the error message \"pmz: rx irq flood\"\ndidn\u0027t produce anything. So I don\u0027t think this code is needed any more.\nRemove it.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0.0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-26999"
},
{
"cve": "CVE-2024-27000",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nserial: mxs-auart: add spinlock around changing cts state\n\nThe uart_handle_cts_change() function in serial_core expects the caller\nto hold uport-\u003elock. For example, I have seen the below kernel splat,\nwhen the Bluetooth driver is loaded on an i.MX28 board.\n\n [ 85.119255] ------------[ cut here ]------------\n [ 85.124413] WARNING: CPU: 0 PID: 27 at /drivers/tty/serial/serial_core.c:3453 uart_handle_cts_change+0xb4/0xec\n [ 85.134694] Modules linked in: hci_uart bluetooth ecdh_generic ecc wlcore_sdio configfs\n [ 85.143314] CPU: 0 PID: 27 Comm: kworker/u3:0 Not tainted 6.6.3-00021-gd62a2f068f92 #1\n [ 85.151396] Hardware name: Freescale MXS (Device Tree)\n [ 85.156679] Workqueue: hci0 hci_power_on [bluetooth]\n (...)\n [ 85.191765] uart_handle_cts_change from mxs_auart_irq_handle+0x380/0x3f4\n [ 85.198787] mxs_auart_irq_handle from __handle_irq_event_percpu+0x88/0x210\n (...)",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0.0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-27000"
},
{
"cve": "CVE-2024-27001",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncomedi: vmk80xx: fix incomplete endpoint checking\n\nWhile vmk80xx does have endpoint checking implemented, some things\ncan fall through the cracks. Depending on the hardware model,\nURBs can have either bulk or interrupt type, and current version\nof vmk80xx_find_usb_endpoints() function does not take that fully\ninto account. While this warning does not seem to be too harmful,\nat the very least it will crash systems with \u0027panic_on_warn\u0027 set on\nthem.\n\nFix the issue found by Syzkaller [1] by somewhat simplifying the\nendpoint checking process with usb_find_common_endpoints() and\nensuring that only expected endpoint types are present.\n\nThis patch has not been tested on real hardware.\n\n[1] Syzkaller report:\nusb 1-1: BOGUS urb xfer, pipe 1 != type 3\nWARNING: CPU: 0 PID: 781 at drivers/usb/core/urb.c:504 usb_submit_urb+0xc4e/0x18c0 drivers/usb/core/urb.c:503\n...\nCall Trace:\n \u003cTASK\u003e\n usb_start_wait_urb+0x113/0x520 drivers/usb/core/message.c:59\n vmk80xx_reset_device drivers/comedi/drivers/vmk80xx.c:227 [inline]\n vmk80xx_auto_attach+0xa1c/0x1a40 drivers/comedi/drivers/vmk80xx.c:818\n comedi_auto_config+0x238/0x380 drivers/comedi/drivers.c:1067\n usb_probe_interface+0x5cd/0xb00 drivers/usb/core/driver.c:399\n...\n\nSimilar issue also found by Syzkaller:",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0.0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-27001"
},
{
"cve": "CVE-2024-27004",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nclk: Get runtime PM before walking tree during disable_unused",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-27004"
},
{
"cve": "CVE-2024-27013",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ntun: limit printing rate when illegal packet received by tun dev\r\n\r\nvhost_worker will call tun call backs to receive packets. If too many\r\nillegal packets arrives, tun_do_read will keep dumping packet contents.\r\nWhen console is enabled, it will costs much more cpu time to dump\r\npacket and soft lockup will be detected.\r\n\r\nnet_ratelimit mechanism can be used to limit the dumping rate.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-27013"
},
{
"cve": "CVE-2024-27019",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: Fix potential data-race in __nft_obj_type_get()\n\nnft_unregister_obj() can concurrent with __nft_obj_type_get(),\nand there is not any protection when iterate over nf_tables_objects\nlist in __nft_obj_type_get(). Therefore, there is potential data-race\nof nf_tables_objects list entry.\n\nUse list_for_each_entry_rcu() to iterate over nf_tables_objects\nlist in __nft_obj_type_get(), and use rcu_read_lock() in the caller\nnft_obj_type_get() to protect the entire type query process.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0.0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-27019"
},
{
"cve": "CVE-2024-27020",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: Fix potential data-race in nft_expr_type_get().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-27020"
},
{
"cve": "CVE-2024-27395",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: openvswitch: Fix Use-After-Free in ovs_ct_exit\n\nSince kfree_rcu, which is called in the hlist_for_each_entry_rcu traversal\nof ovs_ct_limit_exit, is not part of the RCU read critical section, it\nis possible that the RCU grace period will pass during the traversal and\nthe key will be free.\n\nTo prevent this, it should be changed to hlist_for_each_entry_safe.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-27395"
},
{
"cve": "CVE-2024-27396",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: gtp: Fix Use-After-Free in gtp_dellink\n\nSince call_rcu, which is called in the hlist_for_each_entry_rcu traversal\nof gtp_dellink, is not part of the RCU read critical section, it\nis possible that the RCU grace period will pass during the traversal and\nthe key will be free.\n\nTo prevent this, it should be changed to hlist_for_each_entry_safe.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-27396"
},
{
"cve": "CVE-2024-27405",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nusb: gadget: ncm: Avoid dropping datagrams of properly parsed NTBs",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-27405"
},
{
"cve": "CVE-2024-27410",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nwifi: nl80211: reject iftype change with mesh ID change",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-27410"
},
{
"cve": "CVE-2024-27412",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\npower: supply: bq27xxx-i2c: Do not free non existing IRQ",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-27412"
},
{
"cve": "CVE-2024-27413",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nefi/capsule-loader: fix incorrect allocation size",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-27413"
},
{
"cve": "CVE-2024-27414",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nrtnetlink: fix error logic of IFLA_BRIDGE_FLAGS writing back",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-27414"
},
{
"cve": "CVE-2024-27416",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nBluetooth: hci_event: Fix handling of HCI_EV_IO_CAPA_REQUEST",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-27416"
},
{
"cve": "CVE-2024-27417",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nipv6: fix potential \"struct net\" leak in inet6_rtm_getaddr()",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-27417"
},
{
"cve": "CVE-2024-31076",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ngenirq/cpuhotplug, x86/vector: Prevent vector leak during CPU offline\n\nThe absence of IRQD_MOVE_PCNTXT prevents immediate effectiveness of\ninterrupt affinity reconfiguration via procfs. Instead, the change is\ndeferred until the next instance of the interrupt being triggered on the\noriginal CPU.\n\nWhen the interrupt next triggers on the original CPU, the new affinity is\nenforced within __irq_move_irq(). A vector is allocated from the new CPU,\nbut the old vector on the original CPU remains and is not immediately\nreclaimed. Instead, apicd-\u003emove_in_progress is flagged, and the reclaiming\nprocess is delayed until the next trigger of the interrupt on the new CPU.\n\nUpon the subsequent triggering of the interrupt on the new CPU,\nirq_complete_move() adds a task to the old CPU\u0027s vector_cleanup list if it\nremains online. Subsequently, the timer on the old CPU iterates over its\nvector_cleanup list, reclaiming old vectors.\n\nHowever, a rare scenario arises if the old CPU is outgoing before the\ninterrupt triggers again on the new CPU.\n\nIn that case irq_force_complete_move() is not invoked on the outgoing CPU\nto reclaim the old apicd-\u003eprev_vector because the interrupt isn\u0027t currently\naffine to the outgoing CPU, and irq_needs_fixup() returns false. Even\nthough __vector_schedule_cleanup() is later called on the new CPU, it\ndoesn\u0027t reclaim apicd-\u003eprev_vector; instead, it simply resets both\napicd-\u003emove_in_progress and apicd-\u003eprev_vector to 0.\n\nAs a result, the vector remains unreclaimed in vector_matrix, leading to a\nCPU vector leak.\n\nTo address this issue, move the invocation of irq_force_complete_move()\nbefore the irq_needs_fixup() call to reclaim apicd-\u003eprev_vector, if the\ninterrupt is currently or used to be affine to the outgoing CPU.\n\nAdditionally, reclaim the vector in __vector_schedule_cleanup() as well,\nfollowing a warning message, although theoretically it should never see\napicd-\u003emove_in_progress with apicd-\u003eprev_cpu pointing to an offline CPU.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0.0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-31076"
},
{
"cve": "CVE-2024-33621",
"cwe": {
"id": "CWE-1287",
"name": "Improper Validation of Specified Type of Input"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: ipvlan: Dont Use skb-\u003esk in ipvlan_process_v4 / 6_outbound.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-33621"
},
{
"cve": "CVE-2024-34397",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in GNOME GLib before 2.78.5, and 2.79.x and 2.80.x before 2.80.1. When a GDBus-based client subscribes to signals from a trusted system service such as NetworkManager on a shared computer, other users of the same computer can send spoofed D-Bus signals that the GDBus-based client will wrongly interpret as having been sent by the trusted system service. This could lead to the GDBus-based client behaving incorrectly, with an application-dependent impact.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-34397"
},
{
"cve": "CVE-2024-35247",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfpga: region: add owner module and take its refcount\n\nThe current implementation of the fpga region assumes that the low-level\nmodule registers a driver for the parent device and uses its owner pointer\nto take the module\u0027s refcount. This approach is problematic since it can\nlead to a null pointer dereference while attempting to get the region\nduring programming if the parent device does not have a driver.\n\nTo address this problem, add a module owner pointer to the fpga_region\nstruct and use it to take the module\u0027s refcount. Modify the functions for\nregistering a region to take an additional owner module parameter and\nrename them to avoid conflicts. Use the old function names for helper\nmacros that automatically set the module that registers the region as the\nowner. This ensures compatibility with existing low-level control modules\nand reduces the chances of registering a region without setting the owner.\n\nAlso, update the documentation to keep it consistent with the new interface\nfor registering an fpga region.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0.0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-35247"
},
{
"cve": "CVE-2024-35833",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ndmaengine: fsl-qdma: Fix a memory leak related to the queue command DMA",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-35833"
},
{
"cve": "CVE-2024-35835",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnet/mlx5e: fix a double-free in arfs_create_groups",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-35835"
},
{
"cve": "CVE-2024-35847",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nirqchip/gic-v3-its: Prevent double free on error\n\nThe error handling path in its_vpe_irq_domain_alloc() causes a double free\nwhen its_vpe_init() fails after successfully allocating at least one\ninterrupt. This happens because its_vpe_irq_domain_free() frees the\ninterrupts along with the area bitmap and the vprop_page and\nits_vpe_irq_domain_alloc() subsequently frees the area bitmap and the\nvprop_page again.\n\nFix this by unconditionally invoking its_vpe_irq_domain_free() which\nhandles all cases correctly and by removing the bitmap/vprop_page freeing\nfrom its_vpe_irq_domain_alloc().\n\n[ tglx: Massaged change log ]",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0.0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-35847"
},
{
"cve": "CVE-2024-35848",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\neeprom: at24: fix memory corruption race condition\n\nIf the eeprom is not accessible, an nvmem device will be registered, the\nread will fail, and the device will be torn down. If another driver\naccesses the nvmem device after the teardown, it will reference\ninvalid memory.\n\nMove the failure point before registering the nvmem device.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0.0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-35848"
},
{
"cve": "CVE-2024-35852",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmlxsw: spectrum_acl_tcam: Fix memory leak when canceling rehash work\n\nThe rehash delayed work is rescheduled with a delay if the number of\ncredits at end of the work is not negative as supposedly it means that\nthe migration ended. Otherwise, it is rescheduled immediately.\n\nAfter \"mlxsw: spectrum_acl_tcam: Fix possible use-after-free during\nrehash\" the above is no longer accurate as a non-negative number of\ncredits is no longer indicative of the migration being done. It can also\nhappen if the work encountered an error in which case the migration will\nresume the next time the work is scheduled.\n\nThe significance of the above is that it is possible for the work to be\npending and associated with hints that were allocated when the migration\nstarted. This leads to the hints being leaked [1] when the work is\ncanceled while pending as part of ACL region dismantle.\n\nFix by freeing the hints if hints are associated with a work that was\ncanceled while pending.\n\nBlame the original commit since the reliance on not having a pending\nwork associated with hints is fragile.\n\n[1]\nunreferenced object 0xffff88810e7c3000 (size 256):\n comm \"kworker/0:16\", pid 176, jiffies 4295460353\n hex dump (first 32 bytes):\n 00 30 95 11 81 88 ff ff 61 00 00 00 00 00 00 80 .0......a.......\n 00 00 61 00 40 00 00 00 00 00 00 00 04 00 00 00 ..a.@...........\n backtrace (crc 2544ddb9):\n [\u003c00000000cf8cfab3\u003e] kmalloc_trace+0x23f/0x2a0\n [\u003c000000004d9a1ad9\u003e] objagg_hints_get+0x42/0x390\n [\u003c000000000b143cf3\u003e] mlxsw_sp_acl_erp_rehash_hints_get+0xca/0x400\n [\u003c0000000059bdb60a\u003e] mlxsw_sp_acl_tcam_vregion_rehash_work+0x868/0x1160\n [\u003c00000000e81fd734\u003e] process_one_work+0x59c/0xf20\n [\u003c00000000ceee9e81\u003e] worker_thread+0x799/0x12c0\n [\u003c00000000bda6fe39\u003e] kthread+0x246/0x300\n [\u003c0000000070056d23\u003e] ret_from_fork+0x34/0x70\n [\u003c00000000dea2b93e\u003e] ret_from_fork_asm+0x1a/0x30",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0.0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-35852"
},
{
"cve": "CVE-2024-35853",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmlxsw: spectrum_acl_tcam: Fix memory leak during rehash\n\nThe rehash delayed work migrates filters from one region to another.\nThis is done by iterating over all chunks (all the filters with the same\npriority) in the region and in each chunk iterating over all the\nfilters.\n\nIf the migration fails, the code tries to migrate the filters back to\nthe old region. However, the rollback itself can also fail in which case\nanother migration will be erroneously performed. Besides the fact that\nthis ping pong is not a very good idea, it also creates a problem.\n\nEach virtual chunk references two chunks: The currently used one\n(\u0027vchunk-\u003echunk\u0027) and a backup (\u0027vchunk-\u003echunk2\u0027). During migration the\nfirst holds the chunk we want to migrate filters to and the second holds\nthe chunk we are migrating filters from.\n\nThe code currently assumes - but does not verify - that the backup chunk\ndoes not exist (NULL) if the currently used chunk does not reference the\ntarget region. This assumption breaks when we are trying to rollback a\nrollback, resulting in the backup chunk being overwritten and leaked\n[1].\n\nFix by not rolling back a failed rollback and add a warning to avoid\nfuture cases.\n\n[1]\nWARNING: CPU: 5 PID: 1063 at lib/parman.c:291 parman_destroy+0x17/0x20\nModules linked in:\nCPU: 5 PID: 1063 Comm: kworker/5:11 Tainted: G W 6.9.0-rc2-custom-00784-gc6a05c468a0b #14\nHardware name: Mellanox Technologies Ltd. MSN3700/VMOD0005, BIOS 5.11 01/06/2019\nWorkqueue: mlxsw_core mlxsw_sp_acl_tcam_vregion_rehash_work\nRIP: 0010:parman_destroy+0x17/0x20\n[...]\nCall Trace:\n \u003cTASK\u003e\n mlxsw_sp_acl_atcam_region_fini+0x19/0x60\n mlxsw_sp_acl_tcam_region_destroy+0x49/0xf0\n mlxsw_sp_acl_tcam_vregion_rehash_work+0x1f1/0x470\n process_one_work+0x151/0x370\n worker_thread+0x2cb/0x3e0\n kthread+0xd0/0x100\n ret_from_fork+0x34/0x50\n ret_from_fork_asm+0x1a/0x30\n \u003c/TASK\u003e",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-35853"
},
{
"cve": "CVE-2024-35854",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmlxsw: spectrum_acl_tcam: Fix possible use-after-free during rehash\n\nThe rehash delayed work migrates filters from one region to another\naccording to the number of available credits.\n\nThe migrated from region is destroyed at the end of the work if the\nnumber of credits is non-negative as the assumption is that this is\nindicative of migration being complete. This assumption is incorrect as\na non-negative number of credits can also be the result of a failed\nmigration.\n\nThe destruction of a region that still has filters referencing it can\nresult in a use-after-free [1].\n\nFix by not destroying the region if migration failed.\n\n[1]\nBUG: KASAN: slab-use-after-free in mlxsw_sp_acl_ctcam_region_entry_remove+0x21d/0x230\nRead of size 8 at addr ffff8881735319e8 by task kworker/0:31/3858\n\nCPU: 0 PID: 3858 Comm: kworker/0:31 Tainted: G W 6.9.0-rc2-custom-00782-gf2275c2157d8 #5\nHardware name: Mellanox Technologies Ltd. MSN3700/VMOD0005, BIOS 5.11 01/06/2019\nWorkqueue: mlxsw_core mlxsw_sp_acl_tcam_vregion_rehash_work\nCall Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0xc6/0x120\n print_report+0xce/0x670\n kasan_report+0xd7/0x110\n mlxsw_sp_acl_ctcam_region_entry_remove+0x21d/0x230\n mlxsw_sp_acl_ctcam_entry_del+0x2e/0x70\n mlxsw_sp_acl_atcam_entry_del+0x81/0x210\n mlxsw_sp_acl_tcam_vchunk_migrate_all+0x3cd/0xb50\n mlxsw_sp_acl_tcam_vregion_rehash_work+0x157/0x1300\n process_one_work+0x8eb/0x19b0\n worker_thread+0x6c9/0xf70\n kthread+0x2c9/0x3b0\n ret_from_fork+0x4d/0x80\n ret_from_fork_asm+0x1a/0x30\n \u003c/TASK\u003e\n\nAllocated by task 174:\n kasan_save_stack+0x33/0x60\n kasan_save_track+0x14/0x30\n __kasan_kmalloc+0x8f/0xa0\n __kmalloc+0x19c/0x360\n mlxsw_sp_acl_tcam_region_create+0xdf/0x9c0\n mlxsw_sp_acl_tcam_vregion_rehash_work+0x954/0x1300\n process_one_work+0x8eb/0x19b0\n worker_thread+0x6c9/0xf70\n kthread+0x2c9/0x3b0\n ret_from_fork+0x4d/0x80\n ret_from_fork_asm+0x1a/0x30\n\nFreed by task 7:\n kasan_save_stack+0x33/0x60\n kasan_save_track+0x14/0x30\n kasan_save_free_info+0x3b/0x60\n poison_slab_object+0x102/0x170\n __kasan_slab_free+0x14/0x30\n kfree+0xc1/0x290\n mlxsw_sp_acl_tcam_region_destroy+0x272/0x310\n mlxsw_sp_acl_tcam_vregion_rehash_work+0x731/0x1300\n process_one_work+0x8eb/0x19b0\n worker_thread+0x6c9/0xf70\n kthread+0x2c9/0x3b0\n ret_from_fork+0x4d/0x80\n ret_from_fork_asm+0x1a/0x30",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-35854"
},
{
"cve": "CVE-2024-35855",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmlxsw: spectrum_acl_tcam: Fix possible use-after-free during activity update\n\nThe rule activity update delayed work periodically traverses the list of\nconfigured rules and queries their activity from the device.\n\nAs part of this task it accesses the entry pointed by \u0027ventry-\u003eentry\u0027,\nbut this entry can be changed concurrently by the rehash delayed work,\nleading to a use-after-free [1].\n\nFix by closing the race and perform the activity query under the\n\u0027vregion-\u003elock\u0027 mutex.\n\n[1]\nBUG: KASAN: slab-use-after-free in mlxsw_sp_acl_tcam_flower_rule_activity_get+0x121/0x140\nRead of size 8 at addr ffff8881054ed808 by task kworker/0:18/181\n\nCPU: 0 PID: 181 Comm: kworker/0:18 Not tainted 6.9.0-rc2-custom-00781-gd5ab772d32f7 #2\nHardware name: Mellanox Technologies Ltd. MSN3700/VMOD0005, BIOS 5.11 01/06/2019\nWorkqueue: mlxsw_core mlxsw_sp_acl_rule_activity_update_work\nCall Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0xc6/0x120\n print_report+0xce/0x670\n kasan_report+0xd7/0x110\n mlxsw_sp_acl_tcam_flower_rule_activity_get+0x121/0x140\n mlxsw_sp_acl_rule_activity_update_work+0x219/0x400\n process_one_work+0x8eb/0x19b0\n worker_thread+0x6c9/0xf70\n kthread+0x2c9/0x3b0\n ret_from_fork+0x4d/0x80\n ret_from_fork_asm+0x1a/0x30\n \u003c/TASK\u003e\n\nAllocated by task 1039:\n kasan_save_stack+0x33/0x60\n kasan_save_track+0x14/0x30\n __kasan_kmalloc+0x8f/0xa0\n __kmalloc+0x19c/0x360\n mlxsw_sp_acl_tcam_entry_create+0x7b/0x1f0\n mlxsw_sp_acl_tcam_vchunk_migrate_all+0x30d/0xb50\n mlxsw_sp_acl_tcam_vregion_rehash_work+0x157/0x1300\n process_one_work+0x8eb/0x19b0\n worker_thread+0x6c9/0xf70\n kthread+0x2c9/0x3b0\n ret_from_fork+0x4d/0x80\n ret_from_fork_asm+0x1a/0x30\n\nFreed by task 1039:\n kasan_save_stack+0x33/0x60\n kasan_save_track+0x14/0x30\n kasan_save_free_info+0x3b/0x60\n poison_slab_object+0x102/0x170\n __kasan_slab_free+0x14/0x30\n kfree+0xc1/0x290\n mlxsw_sp_acl_tcam_vchunk_migrate_all+0x3d7/0xb50\n mlxsw_sp_acl_tcam_vregion_rehash_work+0x157/0x1300\n process_one_work+0x8eb/0x19b0\n worker_thread+0x6c9/0xf70\n kthread+0x2c9/0x3b0\n ret_from_fork+0x4d/0x80\n ret_from_fork_asm+0x1a/0x30",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0.0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-35855"
},
{
"cve": "CVE-2024-35947",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndyndbg: fix old BUG_ON in \u003econtrol parser\n\nFix a BUG_ON from 2009. Even if it looks \"unreachable\" (I didn\u0027t\nreally look), lets make sure by removing it, doing pr_err and return\n-EINVAL instead.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-35947"
},
{
"cve": "CVE-2024-35955",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "kprobes: Fix possible use-after-free issue on kprobe registration",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-35955"
},
{
"cve": "CVE-2024-35958",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "net: ena: Fix incorrect descriptor free behavior",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-35958"
},
{
"cve": "CVE-2024-35960",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "net/mlx5: Properly link new fs rules into the tree",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-35960"
},
{
"cve": "CVE-2024-35962",
"cwe": {
"id": "CWE-1284",
"name": "Improper Validation of Specified Quantity in Input"
},
"notes": [
{
"category": "summary",
"text": "netfilter: complete validation of user input",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-35962"
},
{
"cve": "CVE-2024-35969",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "summary",
"text": "ipv6: fix race condition between ipv6_get_ifaddr and ipv6_del_addr",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-35969"
},
{
"cve": "CVE-2024-35973",
"cwe": {
"id": "CWE-908",
"name": "Use of Uninitialized Resource"
},
"notes": [
{
"category": "summary",
"text": "geneve: fix header validation in geneve_xmit_skb",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-35973"
},
{
"cve": "CVE-2024-35976",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "xsk: validate user input for XDP_UMEM|COMPLETION_FILL_RING",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-35976"
},
{
"cve": "CVE-2024-35983",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "bounds: Use the right number of bits for power-of-two CONFIG_NR_CPUS",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-35983"
},
{
"cve": "CVE-2024-35984",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "i2c: smbus: fix NULL function pointer dereference",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-35984"
},
{
"cve": "CVE-2024-35990",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"notes": [
{
"category": "summary",
"text": "dma: xilinx_dpdma: Fix locking",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-35990"
},
{
"cve": "CVE-2024-35996",
"cwe": {
"id": "CWE-655",
"name": "Insufficient Psychological Acceptability"
},
"notes": [
{
"category": "summary",
"text": "cpu: Re-enable CPU mitigations by default for !X86 architectures",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-35996"
},
{
"cve": "CVE-2024-36005",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "netfilter: nf_tables: honor table dormant flag from netdev release event path",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-36005"
},
{
"cve": "CVE-2024-36006",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nmlxsw: spectrum_acl_tcam: Fix incorrect list API usage",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-36006"
},
{
"cve": "CVE-2024-36007",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nmlxsw: spectrum_acl_tcam: Fix warning during rehash\r\n\r\nAs previously explained, the rehash delayed work migrates filters from\r\none region to another. This is done by iterating over all chunks (all\r\nthe filters with the same priority) in the region and in each chunk\r\niterating over all the filters.\r\n\r\nWhen the work runs out of credits it stores the current chunk and entry\r\nas markers in the per-work context so that it would know where to resume\r\nthe migration from the next time the work is scheduled.\r\n\r\nUpon error, the chunk marker is reset to NULL, but without resetting the\r\nentry markers despite being relative to it. This can result in migration\r\nbeing resumed from an entry that does not belong to the chunk being\r\nmigrated. In turn, this will eventually lead to a chunk being iterated\r\nover as if it is an entry. Because of how the two structures happen to\r\nbe defined, this does not lead to KASAN splats, but to warnings such as.\r\n\r\nFix by creating a helper that resets all the markers and call it from\r\nall the places the currently only reset the chunk marker. For good\r\nmeasures also call it when starting a completely new rehash. Add a\r\nwarning to avoid future cases.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-36007"
},
{
"cve": "CVE-2024-36008",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nipv4: check for NULL idev in ip_route_use_hint()\r\n\r\nsyzbot was able to trigger a NULL deref in fib_validate_source()\r\nin an old tree.\r\n\r\nIt appears the bug exists in latest trees.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-36008"
},
{
"cve": "CVE-2024-36015",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nppdev: Add an error check in register_device\n\nIn register_device, the return value of ida_simple_get is unchecked,\nin witch ida_simple_get will use an invalid index value.\n\nTo address this issue, index should be checked after ida_simple_get. When\nthe index value is abnormal, a warning message should be printed, the port\nshould be dropped, and the value should be recorded.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0.0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-36015"
},
{
"cve": "CVE-2024-36016",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntty: n_gsm: fix possible out-of-bounds in gsm0_receive()\n\nAssuming the following:\n- side A configures the n_gsm in basic option mode\n- side B sends the header of a basic option mode frame with data length 1\n- side A switches to advanced option mode\n- side B sends 2 data bytes which exceeds gsm-\u003elen\n Reason: gsm-\u003elen is not used in advanced option mode.\n- side A switches to basic option mode\n- side B keeps sending until gsm0_receive() writes past gsm-\u003ebuf\n Reason: Neither gsm-\u003estate nor gsm-\u003elen have been reset after\n reconfiguration.\n\nFix this by changing gsm-\u003ecount to gsm-\u003elen comparison from equal to less\nthan. Also add upper limit checks against the constant MAX_MRU in\ngsm0_receive() and gsm1_receive() to harden against memory corruption of\ngsm-\u003elen and gsm-\u003emru.\n\nAll other checks remain as we still need to limit the data according to the\nuser configuration and actual payload size.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-36016"
},
{
"cve": "CVE-2024-36017",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: rtnetlink: Correct nested IFLA_VF_VLAN_LIST attribute validation Each attribute inside a nested IFLA_VF_VLAN_LIST is assumed to be a struct ifla_vf_vlan_info so the size of such attribute needs to be at least of sizeof(struct ifla_vf_vlan_info) which is 14 bytes. The current size validation in do_setvfinfo is against NLA_HDRLEN (4 bytes) which is less than sizeof(struct ifla_vf_vlan_info) so this validation is not enough and a too small attribute might be cast to a struct ifla_vf_vlan_info, this might result in an out of bands read access when accessing the saved (casted) entry in ivvl.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-36017"
},
{
"cve": "CVE-2024-36031",
"cwe": {
"id": "CWE-324",
"name": "Use of a Key Past its Expiration Date"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nkeys: Fix overwrite of key expiration on instantiation\n\nThe expiry time of a key is unconditionally overwritten during\ninstantiation, defaulting to turn it permanent. This causes a problem\nfor DNS resolution as the expiration set by user-space is overwritten to\nTIME64_MAX, disabling further DNS updates. Fix this by restoring the\ncondition that key_set_expiry is only called when the pre-parser sets a\nspecific expiry.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-36031"
},
{
"cve": "CVE-2024-36270",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "netfilter: tproxy: bail out if IP has been disabled on the device syzbot reports: general protection fault, probably for non-canonical address",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-36270"
},
{
"cve": "CVE-2024-36286",
"cwe": {
"id": "CWE-1287",
"name": "Improper Validation of Specified Type of Input"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: netfilter: nfnetlink_queue: acquire rcu_read_lock() in instance_destroy_rcu().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-36286"
},
{
"cve": "CVE-2024-36288",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "summary",
"text": "SUNRPC: Fix loop termination condition in gss_free_in_token_pages() The in_token-\u003epages[] array is not NULL terminated. This results in the following KASAN splat: KASAN: maybe wild-memory-access in range [0x04a2013400000008-0x04a201340000000f].",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-36288"
},
{
"cve": "CVE-2024-36484",
"cwe": {
"id": "CWE-99",
"name": "Improper Control of Resource Identifiers (\u0027Resource Injection\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: net: relax socket state check at accept time.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-36484"
},
{
"cve": "CVE-2024-36489",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "tls: missing memory barrier in tls_init. In tls_init(), a write memory barrier is missing, and store-store reordering may cause NULL dereference in tls_{setsockopt,getsockopt}.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-36489"
},
{
"cve": "CVE-2024-36883",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: fix out-of-bounds access in ops_init\n\nnet_alloc_generic is called by net_alloc, which is called without any\nlocking. It reads max_gen_ptrs, which is changed under pernet_ops_rwsem. It\nis read twice, first to allocate an array, then to set s.len, which is\nlater used to limit the bounds of the array access.\n\nIt is possible that the array is allocated and another thread is\nregistering a new pernet ops, increments max_gen_ptrs, which is then used\nto set s.len with a larger than allocated length for the variable array.\n\nFix it by reading max_gen_ptrs only once in net_alloc_generic. If\nmax_gen_ptrs is later incremented, it will be caught in net_assign_generic.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0.0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-36883"
},
{
"cve": "CVE-2024-36886",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntipc: fix UAF in error path\n\nSam Page (sam4k) working with Trend Micro Zero Day Initiative reported\na UAF in the tipc_buf_append() error path:\n\nBUG: KASAN: slab-use-after-free in kfree_skb_list_reason+0x47e/0x4c0\nlinux/net/core/skbuff.c:1183\nRead of size 8 at addr ffff88804d2a7c80 by task poc/8034\n\nCPU: 1 PID: 8034 Comm: poc Not tainted 6.8.2 #1\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS\n1.16.0-debian-1.16.0-5 04/01/2014\nCall Trace:\n \u003cIRQ\u003e\n __dump_stack linux/lib/dump_stack.c:88\n dump_stack_lvl+0xd9/0x1b0 linux/lib/dump_stack.c:106\n print_address_description linux/mm/kasan/report.c:377\n print_report+0xc4/0x620 linux/mm/kasan/report.c:488\n kasan_report+0xda/0x110 linux/mm/kasan/report.c:601\n kfree_skb_list_reason+0x47e/0x4c0 linux/net/core/skbuff.c:1183\n skb_release_data+0x5af/0x880 linux/net/core/skbuff.c:1026\n skb_release_all linux/net/core/skbuff.c:1094\n __kfree_skb linux/net/core/skbuff.c:1108\n kfree_skb_reason+0x12d/0x210 linux/net/core/skbuff.c:1144\n kfree_skb linux/./include/linux/skbuff.h:1244\n tipc_buf_append+0x425/0xb50 linux/net/tipc/msg.c:186\n tipc_link_input+0x224/0x7c0 linux/net/tipc/link.c:1324\n tipc_link_rcv+0x76e/0x2d70 linux/net/tipc/link.c:1824\n tipc_rcv+0x45f/0x10f0 linux/net/tipc/node.c:2159\n tipc_udp_recv+0x73b/0x8f0 linux/net/tipc/udp_media.c:390\n udp_queue_rcv_one_skb+0xad2/0x1850 linux/net/ipv4/udp.c:2108\n udp_queue_rcv_skb+0x131/0xb00 linux/net/ipv4/udp.c:2186\n udp_unicast_rcv_skb+0x165/0x3b0 linux/net/ipv4/udp.c:2346\n __udp4_lib_rcv+0x2594/0x3400 linux/net/ipv4/udp.c:2422\n ip_protocol_deliver_rcu+0x30c/0x4e0 linux/net/ipv4/ip_input.c:205\n ip_local_deliver_finish+0x2e4/0x520 linux/net/ipv4/ip_input.c:233\n NF_HOOK linux/./include/linux/netfilter.h:314\n NF_HOOK linux/./include/linux/netfilter.h:308\n ip_local_deliver+0x18e/0x1f0 linux/net/ipv4/ip_input.c:254\n dst_input linux/./include/net/dst.h:461\n ip_rcv_finish linux/net/ipv4/ip_input.c:449\n NF_HOOK linux/./include/linux/netfilter.h:314\n NF_HOOK linux/./include/linux/netfilter.h:308\n ip_rcv+0x2c5/0x5d0 linux/net/ipv4/ip_input.c:569\n __netif_receive_skb_one_core+0x199/0x1e0 linux/net/core/dev.c:5534\n __netif_receive_skb+0x1f/0x1c0 linux/net/core/dev.c:5648\n process_backlog+0x101/0x6b0 linux/net/core/dev.c:5976\n __napi_poll.constprop.0+0xba/0x550 linux/net/core/dev.c:6576\n napi_poll linux/net/core/dev.c:6645\n net_rx_action+0x95a/0xe90 linux/net/core/dev.c:6781\n __do_softirq+0x21f/0x8e7 linux/kernel/softirq.c:553\n do_softirq linux/kernel/softirq.c:454\n do_softirq+0xb2/0xf0 linux/kernel/softirq.c:441\n \u003c/IRQ\u003e\n \u003cTASK\u003e\n __local_bh_enable_ip+0x100/0x120 linux/kernel/softirq.c:381\n local_bh_enable linux/./include/linux/bottom_half.h:33\n rcu_read_unlock_bh linux/./include/linux/rcupdate.h:851\n __dev_queue_xmit+0x871/0x3ee0 linux/net/core/dev.c:4378\n dev_queue_xmit linux/./include/linux/netdevice.h:3169\n neigh_hh_output linux/./include/net/neighbour.h:526\n neigh_output linux/./include/net/neighbour.h:540\n ip_finish_output2+0x169f/0x2550 linux/net/ipv4/ip_output.c:235\n __ip_finish_output linux/net/ipv4/ip_output.c:313\n __ip_finish_output+0x49e/0x950 linux/net/ipv4/ip_output.c:295\n ip_finish_output+0x31/0x310 linux/net/ipv4/ip_output.c:323\n NF_HOOK_COND linux/./include/linux/netfilter.h:303\n ip_output+0x13b/0x2a0 linux/net/ipv4/ip_output.c:433\n dst_output linux/./include/net/dst.h:451\n ip_local_out linux/net/ipv4/ip_output.c:129\n ip_send_skb+0x3e5/0x560 linux/net/ipv4/ip_output.c:1492\n udp_send_skb+0x73f/0x1530 linux/net/ipv4/udp.c:963\n udp_sendmsg+0x1a36/0x2b40 linux/net/ipv4/udp.c:1250\n inet_sendmsg+0x105/0x140 linux/net/ipv4/af_inet.c:850\n sock_sendmsg_nosec linux/net/socket.c:730\n __sock_sendmsg linux/net/socket.c:745\n __sys_sendto+0x42c/0x4e0 linux/net/socket.c:2191\n __do_sys_sendto linux/net/socket.c:2203\n __se_sys_sendto linux/net/socket.c:2199\n __x64_sys_sendto+0xe0/0x1c0 linux/net/socket.c:2199\n do_syscall_x64 linux/arch/x86/entry/common.c:52\n do_syscall_\n---truncated---",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-36886"
},
{
"cve": "CVE-2024-36889",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmptcp: ensure snd_nxt is properly initialized on connect\n\nChristoph reported a splat hinting at a corrupted snd_una:\n\n WARNING: CPU: 1 PID: 38 at net/mptcp/protocol.c:1005 __mptcp_clean_una+0x4b3/0x620 net/mptcp/protocol.c:1005\n Modules linked in:\n CPU: 1 PID: 38 Comm: kworker/1:1 Not tainted 6.9.0-rc1-gbbeac67456c9 #59\n Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.11.0-2.el7 04/01/2014\n Workqueue: events mptcp_worker\n RIP: 0010:__mptcp_clean_una+0x4b3/0x620 net/mptcp/protocol.c:1005\n Code: be 06 01 00 00 bf 06 01 00 00 e8 a8 12 e7 fe e9 00 fe ff ff e8\n \t8e 1a e7 fe 0f b7 ab 3e 02 00 00 e9 d3 fd ff ff e8 7d 1a e7 fe\n \t\u003c0f\u003e 0b 4c 8b bb e0 05 00 00 e9 74 fc ff ff e8 6a 1a e7 fe 0f 0b e9\n RSP: 0018:ffffc9000013fd48 EFLAGS: 00010293\n RAX: 0000000000000000 RBX: ffff8881029bd280 RCX: ffffffff82382fe4\n RDX: ffff8881003cbd00 RSI: ffffffff823833c3 RDI: 0000000000000001\n RBP: 0000000000000000 R08: 0000000000000001 R09: 0000000000000000\n R10: 0000000000000000 R11: fefefefefefefeff R12: ffff888138ba8000\n R13: 0000000000000106 R14: ffff8881029bd908 R15: ffff888126560000\n FS: 0000000000000000(0000) GS:ffff88813bd00000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 00007f604a5dae38 CR3: 0000000101dac002 CR4: 0000000000170ef0\n Call Trace:\n \u003cTASK\u003e\n __mptcp_clean_una_wakeup net/mptcp/protocol.c:1055 [inline]\n mptcp_clean_una_wakeup net/mptcp/protocol.c:1062 [inline]\n __mptcp_retrans+0x7f/0x7e0 net/mptcp/protocol.c:2615\n mptcp_worker+0x434/0x740 net/mptcp/protocol.c:2767\n process_one_work+0x1e0/0x560 kernel/workqueue.c:3254\n process_scheduled_works kernel/workqueue.c:3335 [inline]\n worker_thread+0x3c7/0x640 kernel/workqueue.c:3416\n kthread+0x121/0x170 kernel/kthread.c:388\n ret_from_fork+0x44/0x50 arch/x86/kernel/process.c:147\n ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:243\n \u003c/TASK\u003e\n\nWhen fallback to TCP happens early on a client socket, snd_nxt\nis not yet initialized and any incoming ack will copy such value\ninto snd_una. If the mptcp worker (dumbly) tries mptcp-level\nre-injection after such ack, that would unconditionally trigger a send\nbuffer cleanup using \u0027bad\u0027 snd_una values.\n\nWe could easily disable re-injection for fallback sockets, but such\ndumb behavior already helped catching a few subtle issues and a very\nlow to zero impact in practice.\n\nInstead address the issue always initializing snd_nxt (and write_seq,\nfor consistency) at connect time.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0.0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-36889"
},
{
"cve": "CVE-2024-36901",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "ipv6: prevent NULL dereference in ip6_output() According to syzbot, there is a chance that ip6_dst_idev() returns NULL in ip6_output().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-36901"
},
{
"cve": "CVE-2024-36902",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "Vulnerability in Linux kernel: ipv6: fib6_rules: avoid possible NULL dereference in fib6_rule_action() syzbot is able to trigger the following crash [1], caused by unsafe ip6_dst_idev() use. Indeed ip6_dst_idev() can return NULL, and must always be checked.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-36902"
},
{
"cve": "CVE-2024-36904",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-36904"
},
{
"cve": "CVE-2024-36905",
"cwe": {
"id": "CWE-369",
"name": "Divide By Zero"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: tcp: defer shutdown(SEND_SHUTDOWN) for TCP_SYN_RECV sockets.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-36905"
},
{
"cve": "CVE-2024-36916",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: blk-iocost: avoid out of bounds shift UBSAN catches undefined behavior in blk-iocost, where sometimes iocg-\u003edelay is shifted right by a number that is too large, resulting in undefined behavior on some architectures. [ 186.556576] ------------[ cut here ]------------ UBSAN: shift-out-of-bounds in block/blk-iocost.c:1366:23 shift exponent 64 is too large for 64-bit type \u0027u64\u0027 (aka \u0027unsigned long long\u0027) CPU: 16 PID: 0 Comm: swapper/16 Tainted: G S E N 6.9.0-0_fbk700_debug_rc2_kbuilder_0_gc85af715cac0 #1 Hardware name: Quanta Twin Lakes MP/Twin Lakes Passive MP, BIOS F09_3A23 12/08/2020 Call Trace: \u003cIRQ\u003e dump_stack_lvl+0x8f/0xe0 __ubsan_handle_shift_out_of_bounds+0x22c/0x280 iocg_kick_delay+0x30b/0x310 ioc_timer_fn+0x2fb/0x1f80 __run_timer_base+0x1b6/0x250 ... Avoid that undefined behavior by simply taking the \"delay = 0\" branch if the shift is too large. I am not sure what the symptoms of an undefined value delay will be, but I suspect it could be more than a little annoying to debug.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-36916"
},
{
"cve": "CVE-2024-36929",
"cwe": {
"id": "CWE-237",
"name": "Improper Handling of Structural Elements"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: net: core: reject skb_copy(_expand) for fraglist GSO skbs SKB_GSO_FRAGLIST skbs must not be linearized, otherwise they become invalid. Return NULL if such an skb is passed to skb_copy or skb_copy_expand, in order to prevent a crash on a potential later call to skb_gso_segment.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-36929"
},
{
"cve": "CVE-2024-36933",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnsh: Restore skb-\u003e{protocol,data,mac_header} for outer header in nsh_gso_segment().\n\nsyzbot triggered various splats (see [0] and links) by a crafted GSO\npacket of VIRTIO_NET_HDR_GSO_UDP layering the following protocols:\n\n ETH_P_8021AD + ETH_P_NSH + ETH_P_IPV6 + IPPROTO_UDP\n\nNSH can encapsulate IPv4, IPv6, Ethernet, NSH, and MPLS. As the inner\nprotocol can be Ethernet, NSH GSO handler, nsh_gso_segment(), calls\nskb_mac_gso_segment() to invoke inner protocol GSO handlers.\n\nnsh_gso_segment() does the following for the original skb before\ncalling skb_mac_gso_segment()\n\n 1. reset skb-\u003enetwork_header\n 2. save the original skb-\u003e{mac_heaeder,mac_len} in a local variable\n 3. pull the NSH header\n 4. resets skb-\u003emac_header\n 5. set up skb-\u003emac_len and skb-\u003eprotocol for the inner protocol.\n\nand does the following for the segmented skb\n\n 6. set ntohs(ETH_P_NSH) to skb-\u003eprotocol\n 7. push the NSH header\n 8. restore skb-\u003emac_header\n 9. set skb-\u003emac_header + mac_len to skb-\u003enetwork_header\n 10. restore skb-\u003emac_len\n\nThere are two problems in 6-7 and 8-9.\n\n (a)\n After 6 \u0026 7, skb-\u003edata points to the NSH header, so the outer header\n (ETH_P_8021AD in this case) is stripped when skb is sent out of netdev.\n\n Also, if NSH is encapsulated by NSH + Ethernet (so NSH-Ethernet-NSH),\n skb_pull() in the first nsh_gso_segment() will make skb-\u003edata point\n to the middle of the outer NSH or Ethernet header because the Ethernet\n header is not pulled by the second nsh_gso_segment().\n\n (b)\n While restoring skb-\u003e{mac_header,network_header} in 8 \u0026 9,\n nsh_gso_segment() does not assume that the data in the linear\n buffer is shifted.\n\n However, udp6_ufo_fragment() could shift the data and change\n skb-\u003emac_header accordingly as demonstrated by syzbot.\n\n If this happens, even the restored skb-\u003emac_header points to\n the middle of the outer header.\n\nIt seems nsh_gso_segment() has never worked with outer headers so far.\n\nAt the end of nsh_gso_segment(), the outer header must be restored for\nthe segmented skb, instead of the NSH header.\n\nTo do that, let\u0027s calculate the outer header position relatively from\nthe inner header and set skb-\u003e{data,mac_header,protocol} properly.\n\n[0]:\nBUG: KMSAN: uninit-value in ipvlan_process_outbound drivers/net/ipvlan/ipvlan_core.c:524 [inline]\nBUG: KMSAN: uninit-value in ipvlan_xmit_mode_l3 drivers/net/ipvlan/ipvlan_core.c:602 [inline]\nBUG: KMSAN: uninit-value in ipvlan_queue_xmit+0xf44/0x16b0 drivers/net/ipvlan/ipvlan_core.c:668\n ipvlan_process_outbound drivers/net/ipvlan/ipvlan_core.c:524 [inline]\n ipvlan_xmit_mode_l3 drivers/net/ipvlan/ipvlan_core.c:602 [inline]\n ipvlan_queue_xmit+0xf44/0x16b0 drivers/net/ipvlan/ipvlan_core.c:668\n ipvlan_start_xmit+0x5c/0x1a0 drivers/net/ipvlan/ipvlan_main.c:222\n __netdev_start_xmit include/linux/netdevice.h:4989 [inline]\n netdev_start_xmit include/linux/netdevice.h:5003 [inline]\n xmit_one net/core/dev.c:3547 [inline]\n dev_hard_start_xmit+0x244/0xa10 net/core/dev.c:3563\n __dev_queue_xmit+0x33ed/0x51c0 net/core/dev.c:4351\n dev_queue_xmit include/linux/netdevice.h:3171 [inline]\n packet_xmit+0x9c/0x6b0 net/packet/af_packet.c:276\n packet_snd net/packet/af_packet.c:3081 [inline]\n packet_sendmsg+0x8aef/0x9f10 net/packet/af_packet.c:3113\n sock_sendmsg_nosec net/socket.c:730 [inline]\n __sock_sendmsg net/socket.c:745 [inline]\n __sys_sendto+0x735/0xa10 net/socket.c:2191\n __do_sys_sendto net/socket.c:2203 [inline]\n __se_sys_sendto net/socket.c:2199 [inline]\n __x64_sys_sendto+0x125/0x1c0 net/socket.c:2199\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xcf/0x1e0 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x63/0x6b\n\nUninit was created at:\n slab_post_alloc_hook mm/slub.c:3819 [inline]\n slab_alloc_node mm/slub.c:3860 [inline]\n __do_kmalloc_node mm/slub.c:3980 [inline]\n __kmalloc_node_track_caller+0x705/0x1000 mm/slub.c:4001\n kmalloc_reserve+0x249/0x4a0 net/core/skbuff.c:582\n __\n---truncated---",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0.0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-36933"
},
{
"cve": "CVE-2024-36934",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: bna: ensure the copied buf is NUL terminated Currently, we allocate a nbytes-sized kernel buffer and copy nbytes from userspace to that buffer. Later, we use sscanf on this buffer but we don\u0027t ensure that the string is terminated inside the buffer, this can lead to OOB read when using sscanf. Fix this issue by using memdup_user_nul instead of memdup_user.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-36934"
},
{
"cve": "CVE-2024-36938",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "Denial of Service Vulnerability in the Linux Kernel: bpf, skmsg: Fix NULL pointer dereference in sk_psock_skb_ingress_enqueue Fix NULL pointer data-races in sk_psock_skb_ingress_enqueue() which syzbot reported.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-36938"
},
{
"cve": "CVE-2024-36940",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: pinctrl: core: delete incorrect free in pinctrl_enable() The \"pctldev\" struct is allocated in devm_pinctrl_register_and_init(). It\u0027s a devm_ managed pointer that is freed by devm_pinctrl_dev_release(), so freeing it in pinctrl_enable() will lead to a double free. The devm_pinctrl_dev_release() function frees the pindescs and destroys the mutex as well.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-36940"
},
{
"cve": "CVE-2024-36946",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nphonet: fix rtm_phonet_notify() skb allocation\n\nfill_route() stores three components in the skb:\n\n- struct rtmsg\n- RTA_DST (u8)\n- RTA_OIF (u32)\n\nTherefore, rtm_phonet_notify() should use\n\nNLMSG_ALIGN(sizeof(struct rtmsg)) +\nnla_total_size(1) +\nnla_total_size(4)",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0.0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-36946"
},
{
"cve": "CVE-2024-36954",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntipc: fix a possible memleak in tipc_buf_append\n\n__skb_linearize() doesn\u0027t free the skb when it fails, so move\n\u0027*buf = NULL\u0027 after __skb_linearize(), so that the skb can be\nfreed on the err path.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0.0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-36954"
},
{
"cve": "CVE-2024-36957",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nocteontx2-af: avoid off-by-one read from userspace\n\nWe try to access count + 1 byte from userspace with memdup_user(buffer,\ncount + 1). However, the userspace only provides buffer of count bytes and\nonly these count bytes are verified to be okay to access. To ensure the\ncopied buffer is NUL terminated, we use memdup_user_nul instead.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0.0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-36957"
},
{
"cve": "CVE-2024-36959",
"cwe": {
"id": "CWE-668",
"name": "Exposure of Resource to Wrong Sphere"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: pinctrl: devicetree: fix refcount leak in pinctrl_dt_to_map() If we fail to allocate propname buffer, we need to drop the reference count we just took. Because the pinctrl_dt_free_maps() includes the droping operation, here we call it directly.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-36959"
},
{
"cve": "CVE-2024-36964",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs/9p: only translate RWX permissions for plain 9P2000\n\nGarbage in plain 9P2000\u0027s perm bits is allowed through, which causes it\nto be able to set (among others) the suid bit. This was presumably not\nthe intent since the unix extended bits are handled explicitly and\nconditionally on .u.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0.0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-36964"
},
{
"cve": "CVE-2024-36971",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "1. Describe what is the vulnerability about, e.g.:\n Affected devices do not properly validate input in the hack-me endpoint of the web service.\n\n 2. Describe what an attacker could do with it - e.g.:\n This could allow an unauthenticated remote attacker to execute arbitrary code on the device.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0.0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-36971"
},
{
"cve": "CVE-2024-36974",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "net/sched: taprio: always validate TCA_TAPRIO_ATTR_PRIOMAP. If one TCA_TAPRIO_ATTR_PRIOMAP attribute has been provided, taprio_parse_mqprio_opt() must validate it, or userspace can inject arbitrary data to the kernel, the second time taprio_change() is called. First call (with valid attributes) sets dev-\u003enum_tc to a non zero value. Second call (with arbitrary mqprio attributes) returns early from taprio_parse_mqprio_opt() and bad things can happen.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-36974"
},
{
"cve": "CVE-2024-36978",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "net: sched: sch_multiq: possible OOB write in multiq_tune() q-\u003ebands will be assigned to qopt-\u003ebands to execute subsequent code logic after kmalloc. So the old q-\u003ebands should not be used in kmalloc. Otherwise, an out-of-bounds write will occur.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-36978"
},
{
"cve": "CVE-2024-37356",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: tcp: Fix shift-out-of-bounds in dctcp_update_alpha().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-37356"
},
{
"cve": "CVE-2024-38381",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "nfc: nci: Fix uninit-value in nci_rx_work syzbot reported the following uninit-value access issue [1] nci_rx_work() parses received packet from ndev-\u003erx_q. It should be validated header size, payload size and total packet size before processing the packet. If an invalid packet is detected, it should be silently discarded.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-38381"
},
{
"cve": "CVE-2024-38555",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5: Discard command completions in internal error\n\nFix use after free when FW completion arrives while device is in\ninternal error state. Avoid calling completion handler in this case,\nsince the device will flush the command interface and trigger all\ncompletions manually.\n\nKernel log:\n------------[ cut here ]------------\nrefcount_t: underflow; use-after-free.\n...\nRIP: 0010:refcount_warn_saturate+0xd8/0xe0\n...\nCall Trace:\n\u003cIRQ\u003e\n? __warn+0x79/0x120\n? refcount_warn_saturate+0xd8/0xe0\n? report_bug+0x17c/0x190\n? handle_bug+0x3c/0x60\n? exc_invalid_op+0x14/0x70\n? asm_exc_invalid_op+0x16/0x20\n? refcount_warn_saturate+0xd8/0xe0\ncmd_ent_put+0x13b/0x160 [mlx5_core]\nmlx5_cmd_comp_handler+0x5f9/0x670 [mlx5_core]\ncmd_comp_notifier+0x1f/0x30 [mlx5_core]\nnotifier_call_chain+0x35/0xb0\natomic_notifier_call_chain+0x16/0x20\nmlx5_eq_async_int+0xf6/0x290 [mlx5_core]\nnotifier_call_chain+0x35/0xb0\natomic_notifier_call_chain+0x16/0x20\nirq_int_handler+0x19/0x30 [mlx5_core]\n__handle_irq_event_percpu+0x4b/0x160\nhandle_irq_event+0x2e/0x80\nhandle_edge_irq+0x98/0x230\n__common_interrupt+0x3b/0xa0\ncommon_interrupt+0x7b/0xa0\n\u003c/IRQ\u003e\n\u003cTASK\u003e\nasm_common_interrupt+0x22/0x40",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0.0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-38555"
},
{
"cve": "CVE-2024-38558",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "net: openvswitch: fix overwriting ct original tuple for ICMPv6 OVS_PACKET_CMD_EXECUTE has 3 main attributes: - OVS_PACKET_ATTR_KEY - Packet metadata in a netlink format. - OVS_PACKET_ATTR_PACKET - Binary packet content. - OVS_PACKET_ATTR_ACTIONS - Actions to execute on the packet. OVS_PACKET_ATTR_KEY is parsed first to populate sw_flow_key structure with the metadata like conntrack state, input port, recirculation id, etc.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-38558"
},
{
"cve": "CVE-2024-38578",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "ecryptfs: Fix buffer size for tag 66 packet The \u0027TAG 66 Packet Format\u0027 description is missing the cipher code and checksum fields that are packed into the message packet. As a result, the buffer allocated for the packet is 3 bytes too small and write_tag_66_packet() will write up to 3 bytes past the end of the buffer. Fix this by increasing the size of the allocation so the whole packet will always fit in the buffer.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-38578"
},
{
"cve": "CVE-2024-38579",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "crypto: bcm - Fix pointer arithmetic In spu2_dump_omd() value of ptr is increased by ciph_key_len instead of hash_iv_len which could lead to going beyond the buffer boundaries.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-38579"
},
{
"cve": "CVE-2024-38586",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "r8169: possible ring buffer corruption on fragmented Tx packets. Vulnerability on the RTL8125b when transmitting small fragmented packets, whereby invalid entries were inserted into the transmit ring buffer, subsequently leading to calls to dma_unmap_single() with a null address. This was caused by rtl8169_start_xmit() not noticing changes to nr_frags which may occur when small packets are padded (to work around hardware quirks) in rtl8169_tso_csum_v2().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-38586"
},
{
"cve": "CVE-2024-38587",
"cwe": {
"id": "CWE-129",
"name": "Improper Validation of Array Index"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nspeakup: Fix sizeof() vs ARRAY_SIZE() bug\r\n\r\nThe \"buf\" pointer is an array of u16 values. This code should be\r\nusing ARRAY_SIZE() (which is 256) instead of sizeof() (which is 512),\r\notherwise it can the still got out of bounds.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-38587"
},
{
"cve": "CVE-2024-38589",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "netrom: fix possible dead-lock in nr_rt_ioctl() syzbot loves netrom, and found a possible deadlock in nr_rt_ioctl [1] Make sure we always acquire nr_node_list_lock before nr_node_lock(nr_node).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-38589"
},
{
"cve": "CVE-2024-38590",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/hns: Modify the print level of CQE error\n\nToo much print may lead to a panic in kernel. Change ibdev_err() to\nibdev_err_ratelimited(), and change the printing level of cqe dump\nto debug level.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0.0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-38590"
},
{
"cve": "CVE-2024-38596",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: af_unix: Fix data races in unix_release_sock/unix_stream_sendmsg.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-38596"
},
{
"cve": "CVE-2024-38597",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\neth: sungem: remove .ndo_poll_controller to avoid deadlocks\n\nErhard reports netpoll warnings from sungem:\n\n netpoll_send_skb_on_dev(): eth0 enabled interrupts in poll (gem_start_xmit+0x0/0x398)\n WARNING: CPU: 1 PID: 1 at net/core/netpoll.c:370 netpoll_send_skb+0x1fc/0x20c\n\ngem_poll_controller() disables interrupts, which may sleep.\nWe can\u0027t sleep in netpoll, it has interrupts disabled completely.\nStrangely, gem_poll_controller() doesn\u0027t even poll the completions,\nand instead acts as if an interrupt has fired so it just schedules\nNAPI and exits. None of this has been necessary for years, since\nnetpoll invokes NAPI directly.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0.0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-38597"
},
{
"cve": "CVE-2024-38598",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: md: fix resync softlockup when bitmap size is less than array size.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-38598"
},
{
"cve": "CVE-2024-38601",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nring-buffer: Fix a race between readers and resize checks\n\nThe reader code in rb_get_reader_page() swaps a new reader page into the\nring buffer by doing cmpxchg on old-\u003elist.prev-\u003enext to point it to the\nnew page. Following that, if the operation is successful,\nold-\u003elist.next-\u003eprev gets updated too. This means the underlying\ndoubly-linked list is temporarily inconsistent, page-\u003eprev-\u003enext or\npage-\u003enext-\u003eprev might not be equal back to page for some page in the\nring buffer.\n\nThe resize operation in ring_buffer_resize() can be invoked in parallel.\nIt calls rb_check_pages() which can detect the described inconsistency\nand stop further tracing:\n\n[ 190.271762] ------------[ cut here ]------------\n[ 190.271771] WARNING: CPU: 1 PID: 6186 at kernel/trace/ring_buffer.c:1467 rb_check_pages.isra.0+0x6a/0xa0\n[ 190.271789] Modules linked in: [...]\n[ 190.271991] Unloaded tainted modules: intel_uncore_frequency(E):1 skx_edac(E):1\n[ 190.272002] CPU: 1 PID: 6186 Comm: cmd.sh Kdump: loaded Tainted: G E 6.9.0-rc6-default #5 158d3e1e6d0b091c34c3b96bfd99a1c58306d79f\n[ 190.272011] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.16.0-0-gd239552c-rebuilt.opensuse.org 04/01/2014\n[ 190.272015] RIP: 0010:rb_check_pages.isra.0+0x6a/0xa0\n[ 190.272023] Code: [...]\n[ 190.272028] RSP: 0018:ffff9c37463abb70 EFLAGS: 00010206\n[ 190.272034] RAX: ffff8eba04b6cb80 RBX: 0000000000000007 RCX: ffff8eba01f13d80\n[ 190.272038] RDX: ffff8eba01f130c0 RSI: ffff8eba04b6cd00 RDI: ffff8eba0004c700\n[ 190.272042] RBP: ffff8eba0004c700 R08: 0000000000010002 R09: 0000000000000000\n[ 190.272045] R10: 00000000ffff7f52 R11: ffff8eba7f600000 R12: ffff8eba0004c720\n[ 190.272049] R13: ffff8eba00223a00 R14: 0000000000000008 R15: ffff8eba067a8000\n[ 190.272053] FS: 00007f1bd64752c0(0000) GS:ffff8eba7f680000(0000) knlGS:0000000000000000\n[ 190.272057] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 190.272061] CR2: 00007f1bd6662590 CR3: 000000010291e001 CR4: 0000000000370ef0\n[ 190.272070] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n[ 190.272073] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n[ 190.272077] Call Trace:\n[ 190.272098] \u003cTASK\u003e\n[ 190.272189] ring_buffer_resize+0x2ab/0x460\n[ 190.272199] __tracing_resize_ring_buffer.part.0+0x23/0xa0\n[ 190.272206] tracing_resize_ring_buffer+0x65/0x90\n[ 190.272216] tracing_entries_write+0x74/0xc0\n[ 190.272225] vfs_write+0xf5/0x420\n[ 190.272248] ksys_write+0x67/0xe0\n[ 190.272256] do_syscall_64+0x82/0x170\n[ 190.272363] entry_SYSCALL_64_after_hwframe+0x76/0x7e\n[ 190.272373] RIP: 0033:0x7f1bd657d263\n[ 190.272381] Code: [...]\n[ 190.272385] RSP: 002b:00007ffe72b643f8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001\n[ 190.272391] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 00007f1bd657d263\n[ 190.272395] RDX: 0000000000000002 RSI: 0000555a6eb538e0 RDI: 0000000000000001\n[ 190.272398] RBP: 0000555a6eb538e0 R08: 000000000000000a R09: 0000000000000000\n[ 190.272401] R10: 0000555a6eb55190 R11: 0000000000000246 R12: 00007f1bd6662500\n[ 190.272404] R13: 0000000000000002 R14: 00007f1bd6667c00 R15: 0000000000000002\n[ 190.272412] \u003c/TASK\u003e\n[ 190.272414] ---[ end trace 0000000000000000 ]---\n\nNote that ring_buffer_resize() calls rb_check_pages() only if the parent\ntrace_buffer has recording disabled. Recent commit d78ab792705c\n(\"tracing: Stop current tracer when resizing buffer\") causes that it is\nnow always the case which makes it more likely to experience this issue.\n\nThe window to hit this race is nonetheless very small. To help\nreproducing it, one can add a delay loop in rb_get_reader_page():\n\n ret = rb_head_page_replace(reader, cpu_buffer-\u003ereader_page);\n if (!ret)\n \tgoto spin;\n for (unsigned i = 0; i \u003c 1U \u003c\u003c 26; i++) /* inserted delay loop */\n \t__asm__ __volatile__ (\"\" : : : \"memory\");\n rb_list_head(reader-\u003elist.next)-\u003eprev = \u0026cpu_buffer-\u003ereader_page-\u003elist;\n\n.. \n---truncated---",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0.0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-38601"
},
{
"cve": "CVE-2024-38612",
"cwe": {
"id": "CWE-459",
"name": "Incomplete Cleanup"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: ipv6: sr: fix invalid unregister error path The error path of seg6_init() is wrong in case CONFIG_IPV6_SEG6_LWTUNNEL is not defined. In that case if seg6_hmac_init() fails, the genl_unregister_family() isn\u0027t called. This issue exist since commit 46738b1317e1 (\"ipv6: sr: add option to control lwtunnel support\"), and commit 5559cea2d5aa (\"ipv6: sr: fix possible use-after-free and null-ptr-deref\") replaced unregister_pernet_subsys() with genl_unregister_family() in this error path.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-38612"
},
{
"cve": "CVE-2024-38615",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "cpufreq: exit() callback is optional The exit() callback is optional and shouldn\u0027t be called without checking a valid pointer first. Also, we must clear freq_table pointer even if the exit() callback isn\u0027t present.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-38615"
},
{
"cve": "CVE-2024-38619",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "usb-storage: alauda: Check whether the media is initialized. The member \"uzonesize\" of struct alauda_info will remain 0 if alauda_init_media() fails, potentially causing divide errors in alauda_read_data() and alauda_write_lba().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-38619"
},
{
"cve": "CVE-2024-38627",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nstm class: Fix a double free in stm_register_device()\n\nThe put_device(\u0026stm-\u003edev) call will trigger stm_device_release() which\nfrees \"stm\" so the vfree(stm) on the next line is a double free.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0.0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-38627"
},
{
"cve": "CVE-2024-38633",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nserial: max3100: Update uart_driver_registered on driver removal\n\nThe removal of the last MAX3100 device triggers the removal of\nthe driver. However, code doesn\u0027t update the respective global\nvariable and after insmod \u2014 rmmod \u2014 insmod cycle the kernel\noopses:\n\n max3100 spi-PRP0001:01: max3100_probe: adding port 0\n BUG: kernel NULL pointer dereference, address: 0000000000000408\n ...\n RIP: 0010:serial_core_register_port+0xa0/0x840\n ...\n max3100_probe+0x1b6/0x280 [max3100]\n spi_probe+0x8d/0xb0\n\nUpdate the actual state so next time UART driver will be registered\nagain.\n\nHugo also noticed, that the error path in the probe also affected\nby having the variable set, and not cleared. Instead of clearing it\nmove the assignment after the successfull uart_register_driver() call.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0.0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-38633"
},
{
"cve": "CVE-2024-38634",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nserial: max3100: Lock port-\u003elock when calling uart_handle_cts_change()\n\nuart_handle_cts_change() has to be called with port lock taken,\nSince we run it in a separate work, the lock may not be taken at\nthe time of running. Make sure that it\u0027s taken by explicitly doing\nthat. Without it we got a splat:\n\n WARNING: CPU: 0 PID: 10 at drivers/tty/serial/serial_core.c:3491 uart_handle_cts_change+0xa6/0xb0\n ...\n Workqueue: max3100-0 max3100_work [max3100]\n RIP: 0010:uart_handle_cts_change+0xa6/0xb0\n ...\n max3100_handlerx+0xc5/0x110 [max3100]\n max3100_work+0x12a/0x340 [max3100]",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0.0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-38634"
},
{
"cve": "CVE-2024-38637",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ngreybus: lights: check return of get_channel_from_mode\n\nIf channel for the given node is not found we return null from\nget_channel_from_mode. Make sure we validate the return pointer\nbefore using it in two of the missing places.\n\nThis was originally reported in [0]:\nFound by Linux Verification Center (linuxtesting.org) with SVACE.\n\n[0] https://lore.kernel.org/all/20240301190425.120605-1-m.lobanov@rosalinux.ru",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0.0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-38637"
},
{
"cve": "CVE-2024-38659",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "enic: Validate length of nl attributes in enic_set_vf_port enic_set_vf_port assumes that the nl attribute IFLA_PORT_PROFILE is of length PORT_PROFILE_MAX and that the nl attributes IFLA_PORT_INSTANCE_UUID, IFLA_PORT_HOST_UUID are of length PORT_UUID_MAX. These attributes are validated (in the function do_setlink in rtnetlink.c) using the nla_policy ifla_port_policy. The policy defines IFLA_PORT_PROFILE as NLA_STRING, IFLA_PORT_INSTANCE_UUID as NLA_BINARY and IFLA_PORT_HOST_UUID as NLA_STRING. That means that the length validation using the policy is for the max size of the attributes and not on exact size so the length of these attributes might be less than the sizes that enic_set_vf_port expects. This might cause an out of bands read access in the memcpys of the data of these attributes in enic_set_vf_port.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-38659"
},
{
"cve": "CVE-2024-38662",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "bpf: Allow delete from sockmap/sockhash only if update is allowed. We have seen an influx of syzkaller reports where a BPF program attached to a tracepoint triggers a locking rule violation by performing a map_delete on a sockmap/sockhash. We don\u0027t intend to support this artificial use scenario. Extend the existing verifier allowed-program-type check for updating sockmap/sockhash to also cover deleting from a map. From now on only BPF programs which were previously allowed to update sockmap/sockhash can delete from these map types.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-38662"
},
{
"cve": "CVE-2024-38780",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: dma-buf/sw-sync: don\u0027t enable IRQ from sync_print_obj().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-38780"
},
{
"cve": "CVE-2024-39276",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: fix mb_cache_entry\u0027s e_refcnt leak in ext4_xattr_block_cache_find()\n\nSyzbot reports a warning as follows:\n\n============================================\nWARNING: CPU: 0 PID: 5075 at fs/mbcache.c:419 mb_cache_destroy+0x224/0x290\nModules linked in:\nCPU: 0 PID: 5075 Comm: syz-executor199 Not tainted 6.9.0-rc6-gb947cc5bf6d7\nRIP: 0010:mb_cache_destroy+0x224/0x290 fs/mbcache.c:419\nCall Trace:\n \u003cTASK\u003e\n ext4_put_super+0x6d4/0xcd0 fs/ext4/super.c:1375\n generic_shutdown_super+0x136/0x2d0 fs/super.c:641\n kill_block_super+0x44/0x90 fs/super.c:1675\n ext4_kill_sb+0x68/0xa0 fs/ext4/super.c:7327\n[...]\n============================================\n\nThis is because when finding an entry in ext4_xattr_block_cache_find(), if\next4_sb_bread() returns -ENOMEM, the ce\u0027s e_refcnt, which has already grown\nin the __entry_find(), won\u0027t be put away, and eventually trigger the above\nissue in mb_cache_destroy() due to reference count leakage.\n\nSo call mb_cache_entry_put() on the -ENOMEM error branch as a quick fix.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-39276"
},
{
"cve": "CVE-2024-39292",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: um: Add winch to winch_handlers before registering winch IRQ Registering a winch IRQ is racy, an interrupt may occur before the winch is added to the winch_handlers list. If that happens, register_winch_irq() adds to that list a winch that is scheduled to be (or has already been) freed, causing a panic later in winch_cleanup(). Avoid the race by adding the winch to the winch_handlers list before registering the IRQ, and rolling back if um_request_irq() fails.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-39292"
},
{
"cve": "CVE-2024-39301",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/9p: fix uninit-value in p9_client_rpc()\n\nSyzbot with the help of KMSAN reported the following error:\n\nBUG: KMSAN: uninit-value in trace_9p_client_res include/trace/events/9p.h:146 [inline]\nBUG: KMSAN: uninit-value in p9_client_rpc+0x1314/0x1340 net/9p/client.c:754\n trace_9p_client_res include/trace/events/9p.h:146 [inline]\n p9_client_rpc+0x1314/0x1340 net/9p/client.c:754\n p9_client_create+0x1551/0x1ff0 net/9p/client.c:1031\n v9fs_session_init+0x1b9/0x28e0 fs/9p/v9fs.c:410\n v9fs_mount+0xe2/0x12b0 fs/9p/vfs_super.c:122\n legacy_get_tree+0x114/0x290 fs/fs_context.c:662\n vfs_get_tree+0xa7/0x570 fs/super.c:1797\n do_new_mount+0x71f/0x15e0 fs/namespace.c:3352\n path_mount+0x742/0x1f20 fs/namespace.c:3679\n do_mount fs/namespace.c:3692 [inline]\n __do_sys_mount fs/namespace.c:3898 [inline]\n __se_sys_mount+0x725/0x810 fs/namespace.c:3875\n __x64_sys_mount+0xe4/0x150 fs/namespace.c:3875\n do_syscall_64+0xd5/0x1f0\n entry_SYSCALL_64_after_hwframe+0x6d/0x75\n\nUninit was created at:\n __alloc_pages+0x9d6/0xe70 mm/page_alloc.c:4598\n __alloc_pages_node include/linux/gfp.h:238 [inline]\n alloc_pages_node include/linux/gfp.h:261 [inline]\n alloc_slab_page mm/slub.c:2175 [inline]\n allocate_slab mm/slub.c:2338 [inline]\n new_slab+0x2de/0x1400 mm/slub.c:2391\n ___slab_alloc+0x1184/0x33d0 mm/slub.c:3525\n __slab_alloc mm/slub.c:3610 [inline]\n __slab_alloc_node mm/slub.c:3663 [inline]\n slab_alloc_node mm/slub.c:3835 [inline]\n kmem_cache_alloc+0x6d3/0xbe0 mm/slub.c:3852\n p9_tag_alloc net/9p/client.c:278 [inline]\n p9_client_prepare_req+0x20a/0x1770 net/9p/client.c:641\n p9_client_rpc+0x27e/0x1340 net/9p/client.c:688\n p9_client_create+0x1551/0x1ff0 net/9p/client.c:1031\n v9fs_session_init+0x1b9/0x28e0 fs/9p/v9fs.c:410\n v9fs_mount+0xe2/0x12b0 fs/9p/vfs_super.c:122\n legacy_get_tree+0x114/0x290 fs/fs_context.c:662\n vfs_get_tree+0xa7/0x570 fs/super.c:1797\n do_new_mount+0x71f/0x15e0 fs/namespace.c:3352\n path_mount+0x742/0x1f20 fs/namespace.c:3679\n do_mount fs/namespace.c:3692 [inline]\n __do_sys_mount fs/namespace.c:3898 [inline]\n __se_sys_mount+0x725/0x810 fs/namespace.c:3875\n __x64_sys_mount+0xe4/0x150 fs/namespace.c:3875\n do_syscall_64+0xd5/0x1f0\n entry_SYSCALL_64_after_hwframe+0x6d/0x75\n\nIf p9_check_errors() fails early in p9_client_rpc(), req-\u003erc.tag\nwill not be properly initialized. However, trace_9p_client_res()\nends up trying to print it out anyway before p9_client_rpc()\nfinishes.\n\nFix this issue by assigning default values to p9_fcall fields\nsuch as \u0027tag\u0027 and (just in case KMSAN unearths something new) \u0027id\u0027\nduring the tag allocation stage.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0.0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-39301"
},
{
"cve": "CVE-2024-39468",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "smb: client: Deadlock in smb2_find_smb_tcon().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-39468"
},
{
"cve": "CVE-2024-39475",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfbdev: savage: Handle err return when savagefb_check_var failed\n\nThe commit 04e5eac8f3ab(\"fbdev: savage: Error out if pixclock equals zero\")\nchecks the value of pixclock to avoid divide-by-zero error. However\nthe function savagefb_probe doesn\u0027t handle the error return of\nsavagefb_check_var. When pixclock is 0, it will cause divide-by-zero error.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0.0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-39475"
},
{
"cve": "CVE-2024-39476",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nmd/raid5: fix deadlock that raid5d() wait for itself to clear MD_SB_CHANGE_PENDING",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-39476"
},
{
"cve": "CVE-2024-39480",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nkdb: Fix buffer overflow during tab-complete\n\nCurrently, when the user attempts symbol completion with the Tab key, kdb\nwill use strncpy() to insert the completed symbol into the command buffer.\nUnfortunately it passes the size of the source buffer rather than the\ndestination to strncpy() with predictably horrible results. Most obviously\nif the command buffer is already full but cp, the cursor position, is in\nthe middle of the buffer, then we will write past the end of the supplied\nbuffer.\n\nFix this by replacing the dubious strncpy() calls with memmove()/memcpy()\ncalls plus explicit boundary checks to make sure we have enough space\nbefore we start moving characters around.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-39480"
},
{
"cve": "CVE-2024-39482",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "bcache: Variable length array abuse in btree_iter.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-39482"
},
{
"cve": "CVE-2024-39487",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: bonding: Fix out-of-bounds read in bond_option_arp_ip_targets_set().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-39487"
},
{
"cve": "CVE-2024-39489",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: ipv6: sr: fix memleak in seg6_hmac_init_algo seg6_hmac_init_algo returns without cleaning up the previous allocations if one fails, so it\u0027s going to leak all that memory and the crypto tfms. Update seg6_hmac_exit to only free the memory when allocated, so we can reuse the code directly.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-39489"
},
{
"cve": "CVE-2024-39493",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: qat - Fix ADF_DEV_RESET_SYNC memory leak\n\nUsing completion_done to determine whether the caller has gone\naway only works after a complete call. Furthermore it\u0027s still\npossible that the caller has not yet called wait_for_completion,\nresulting in another potential UAF.\n\nFix this by making the caller use cancel_work_sync and then freeing\nthe memory safely.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-39493"
},
{
"cve": "CVE-2024-39495",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "greybus: use-after-free vulnerability in gb_interface_release due to race condition.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-39495"
},
{
"cve": "CVE-2024-39499",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "summary",
"text": "vmci: speculation leaks by sanitizing event in event_deliver(). event_msg is controlled by user-space, event_msg-\u003eevent_data.event is passed to event_deliver() and used as an index without sanitization, leading to information leaks.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-39499"
},
{
"cve": "CVE-2024-39501",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "drivers: core: synchronize really_probe() and dev_uevent(). Synchronize the dev-\u003edriver usage in really_probe() and dev_uevent(). These can run in different threads, what can result in the following race condition for dev-\u003edriver uninitialization.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-39501"
},
{
"cve": "CVE-2024-39502",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "ionic: use after netif_napi_del(). When queues are started, netif_napi_add() and napi_enable() are called. If there are 4 queues and only 3 queues are used for the current configuration, only 3 queues\u0027 napi should be registered and enabled. The ionic_qcq_enable() checks whether the .poll pointer is not NULL for enabling only the using queue\u0027 napi. Unused queues\u0027 napi will not be registered by netif_napi_add(), so the .poll pointer indicates NULL. But it couldn\u0027t distinguish whether the napi was unregistered or not because netif_napi_del() doesn\u0027t reset the .poll pointer to NULL. So, ionic_qcq_enable() calls napi_enable() for the queue, which was unregistered by netif_napi_del().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-39502"
},
{
"cve": "CVE-2024-39503",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "netfilter: ipset: race between namespace cleanup and gc in the list:set type. The namespace cleanup can destroy the list:set type of sets while the gc of the set type is waiting to run in rcu cleanup. The latter uses data from the destroyed set which thus leads use after free.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-39503"
},
{
"cve": "CVE-2024-39506",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "liquidio: Adjust a NULL pointer handling path in lio_vf_rep_copy_packet. In lio_vf_rep_copy_packet() pg_info-\u003epage is compared to a NULL value, but then it is unconditionally passed to skb_add_rx_frag(), which could lead to null pointer dereference.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-39506"
},
{
"cve": "CVE-2024-40904",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "USB: class: cdc-wdm: CPU lockup caused by excessive log messages.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-40904"
},
{
"cve": "CVE-2024-40905",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "ipv6: possible race in __fib6_drop_pcpu_from().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-40905"
},
{
"cve": "CVE-2024-40931",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "mptcp: ensure snd_una is properly initialized on connect.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-40931"
},
{
"cve": "CVE-2024-40945",
"cwe": {
"id": "CWE-393",
"name": "Return of Wrong Status Code"
},
"notes": [
{
"category": "summary",
"text": "iommu: Return right value in iommu_sva_bind_device() iommu_sva_bind_device() should return either a sva bond handle or an ERR_PTR value in error cases. Existing drivers (idxd and uacce) only check the return value with IS_ERR(). This could potentially lead to a kernel NULL pointer dereference issue if the function returns NULL instead of an error pointer. In reality, this doesn\u0027t cause any problems because iommu_sva_bind_device() only returns NULL when the kernel is not configured with CONFIG_IOMMU_SVA.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-40945"
},
{
"cve": "CVE-2024-40947",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "ima: Avoid blocking in RCU read-side critical section, a panic happens in ima_match_policy.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-40947"
},
{
"cve": "CVE-2024-40958",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "netns: Make get_net_ns() handle zero refcount net Syzkaller hit a warning: refcount_t: addition on 0; use-after-free.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.0,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-40958"
},
{
"cve": "CVE-2024-40959",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: xfrm6: check ip6_dst_idev() return value in xfrm6_get_saddr().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-40959"
},
{
"cve": "CVE-2024-40960",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "ipv6: prevent possible NULL dereference in rt6_probe() syzbot caught a NULL dereference in rt6_probe() [1] Bail out if __in6_dev_get() returns NULL.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-40960"
},
{
"cve": "CVE-2024-40961",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "ipv6: prevent possible NULL deref in fib6_nh_init() syzbot reminds us that in6_dev_get() can return NULL.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-40961"
},
{
"cve": "CVE-2024-40980",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "drop_monitor: replace spin_lock by raw_spin_lock trace_drop_common() is called with preemption disabled, and it acquires a spin_lock. This is problematic for RT kernels because spin_locks are sleeping locks in this configuration, which causes the following splat.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-40980"
},
{
"cve": "CVE-2024-40983",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "tipc: possible crash before doing decryption.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-40983"
},
{
"cve": "CVE-2024-40984",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "ACPICA: Revert \"ACPICA: avoid Info: mapping multiple BARs. Your kernel is fine.\"",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-40984"
},
{
"cve": "CVE-2024-40990",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "ptp: integer overflow in max_vclocks_store.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-40990"
},
{
"cve": "CVE-2024-40995",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "net/sched: act_api: possible infinite loop in tcf_idr_check_alloc().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-40995"
},
{
"cve": "CVE-2024-41000",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "summary",
"text": "block/ioctl: prefer different overflow check Running syzkaller with the newly reintroduced signed integer overflow sanitizer.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-41000"
},
{
"cve": "CVE-2024-41004",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "tracing: Build event generation tests only as modules The kprobes and synth event generation test modules add events and lock (get a reference) those event file reference in module init function, and unlock and delete it in module exit function. This is because those are designed for playing as modules. If we make those modules as built-in, those events are left locked in the kernel, and never be removed.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-41004"
},
{
"cve": "CVE-2024-41005",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "netpoll: race condition in netpoll_owner_active KCSAN detected a race condition in netpoll.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-41005"
},
{
"cve": "CVE-2024-41006",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "summary",
"text": "netrom: a memory leak in nr_heartbeat_expiry().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-41006"
},
{
"cve": "CVE-2024-41007",
"cwe": {
"id": "CWE-99",
"name": "Improper Control of Resource Identifiers (\u0027Resource Injection\u0027)"
},
"notes": [
{
"category": "summary",
"text": "tcp: avoid too many retransmit packets If a TCP socket is using TCP_USER_TIMEOUT.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-41007"
},
{
"cve": "CVE-2024-41009",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "summary",
"text": "bpf: Fix overrunning reservations in ringbuf.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-41009"
},
{
"cve": "CVE-2024-41012",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "filelock: Remove locks reliably when fcntl/close race is detected When fcntl_setlk() races with close(), it removes the created lock with do_lock_file_wait().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-41012"
},
{
"cve": "CVE-2024-41020",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "filelock: race condition vulnerability between fcntl and close operations, which can lead to issues in the recovery compatibility path.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-41020"
},
{
"cve": "CVE-2024-41035",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "USB: core: duplicate endpoint bug.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-41035"
},
{
"cve": "CVE-2024-41040",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "net/sched: UAF when resolving a clash.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-41040"
},
{
"cve": "CVE-2024-41041",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "udp: small race window.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-41041"
},
{
"cve": "CVE-2024-41044",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "ppp: claimed-as-LCP but actually malformed packets.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-41044"
},
{
"cve": "CVE-2024-41046",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: net: ethernet: lantiq_etop: fix double free in detach The number of the currently released descriptor is never incremented which results in the same skb being released multiple times.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-41046"
},
{
"cve": "CVE-2024-41049",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: filelock: fix potential use-after-free in posix_lock_inode Light Hsieh reported a KASAN UAF warning in trace_posix_lock_inode(). The request pointer had been changed earlier to point to a lock entry that was added to the inode\u0027s list. However, before the tracepoint could fire, another task raced in and freed that lock. Fix this by moving the tracepoint inside the spinlock, which should ensure that this doesn\u0027t happen.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-41049"
},
{
"cve": "CVE-2024-41055",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: mm: prevent derefencing NULL ptr in pfn_section_valid() Commit 5ec8e8ea8b77 (\"mm/sparsemem: fix race in accessing memory_section-\u003eusage\") changed pfn_section_valid() to add a READ_ONCE() call around \"ms-\u003eusage\" to fix a race with section_deactivate() where ms-\u003eusage can be cleared. The READ_ONCE() call, by itself, is not enough to prevent NULL pointer dereference. We need to check its value before dereferencing it.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-41055"
},
{
"cve": "CVE-2024-41077",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "null_blk: validation error on block size.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-41077"
},
{
"cve": "CVE-2024-41081",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "ila: block BH in ila_output().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-41081"
},
{
"cve": "CVE-2024-41087",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "ata: libata-core: double free on error.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-41087"
},
{
"cve": "CVE-2024-41090",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "tap: add missing verification for short frame. Missing to check against the validity of the frame length in the tap_get_user_xdp() path, which could cause a corrupted skb to be sent downstack. Even before the skb is transmitted, the tap_get_user_xdp()--\u003eskb_set_network_header() may assume the size is more than ETH_HLEN. Once transmitted, this could either cause out-of-bound access beyond the actual length, or confuse the underlayer with incorrect or inconsistent header length in the skb metadata.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-41090"
},
{
"cve": "CVE-2024-41091",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "tun: add missing verification for short frame. Missing to check against the validity of the frame length in the tun_xdp_one() path could cause a corrupted skb to be sent downstack. Even before the skb is transmitted, the tun_xdp_one--\u003eeth_type_trans() may access the Ethernet header although it can be less than ETH_HLEN. Once transmitted, this could either causeout-of-bound access beyond the actual length, or confuse the underlayer with incorrect or inconsistent header length in the skb metadata.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-41091"
},
{
"cve": "CVE-2024-41097",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "usb: atm: cxacru: incomplete endpoint checking in cxacru_bind().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-41097"
},
{
"cve": "CVE-2024-42070",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: fully validate NFT_DATA_VALUE on store to data registers register store validation for NFT_DATA_VALUE is conditional, however, the datatype is always either NFT_DATA_VALUE or NFT_DATA_VERDICT. This only requires a new helper function to infer the register type from the set datatype so this conditional check can be removed. Otherwise, pointer to chain object can be leaked through the registers.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-42070"
},
{
"cve": "CVE-2024-42076",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "net: can: j1939: unused data in j1939_send_one().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-42076"
},
{
"cve": "CVE-2024-42082",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "summary",
"text": "xdp: unused WARN() in __xdp_reg_mem_model().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-42082"
},
{
"cve": "CVE-2024-42084",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "ftruncate: passing a negative length accidentally succeeds in truncating to file size between 2GiB and 4GiB.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-42084"
},
{
"cve": "CVE-2024-42086",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "iio: chemical: bme680: overflows in compensate() functions.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-42086"
},
{
"cve": "CVE-2024-42089",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: fsl-asoc-card: set priv-\u003epdev before using it\n\npriv-\u003epdev pointer was set after being used in\nfsl_asoc_card_audmux_init().\nMove this assignment at the start of the probe function, so\nsub-functions can correctly use pdev through priv.\n\nfsl_asoc_card_audmux_init() dereferences priv-\u003epdev to get access to the\ndev struct, used with dev_err macros.\nAs priv is zero-initialised, there would be a NULL pointer dereference.\nNote that if priv-\u003edev is dereferenced before assignment but never used,\nfor example if there is no error to be printed, the driver won\u0027t crash\nprobably due to compiler optimisations.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0.0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-42089"
},
{
"cve": "CVE-2024-42092",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "gpio: davinci: There can be out of chips-\u003eirqs array boundaries access in davinci_gpio_probe().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-42092"
},
{
"cve": "CVE-2024-42093",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "net/dpaa2: explicit cpumask var allocation on stack For CONFIG_CPUMASK_OFFSTACK=y kernel, explicit allocation of cpumask variable on stack can cause potential stack overflow.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-42093"
},
{
"cve": "CVE-2024-42094",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "net/iucv: explicit cpumask var allocation on stack For CONFIG_CPUMASK_OFFSTACK=y kernel, explicit allocation of cpumask variable on stack can cause potential stack overflow.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-42094"
},
{
"cve": "CVE-2024-42095",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "serial: 8250_omap: Erroneous timeout can be triggered, and it may lead to storm of interrupts.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-42095"
},
{
"cve": "CVE-2024-42102",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRevert \"mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again\"\n\nPatch series \"mm: Avoid possible overflows in dirty throttling\".\n\nDirty throttling logic assumes dirty limits in page units fit into\n32-bits. This patch series makes sure this is true (see patch 2/2 for\nmore details).\n\n\nThis patch (of 2):\n\nThis reverts commit 9319b647902cbd5cc884ac08a8a6d54ce111fc78.\n\nThe commit is broken in several ways. Firstly, the removed (u64) cast\nfrom the multiplication will introduce a multiplication overflow on 32-bit\narchs if wb_thresh * bg_thresh \u003e= 1\u003c\u003c32 (which is actually common - the\ndefault settings with 4GB of RAM will trigger this). Secondly, the\ndiv64_u64() is unnecessarily expensive on 32-bit archs. We have\ndiv64_ul() in case we want to be safe \u0026 cheap. Thirdly, if dirty\nthresholds are larger than 1\u003c\u003c32 pages, then dirty balancing is going to\nblow up in many other spectacular ways anyway so trying to fix one\npossible overflow is just moot.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0.0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-42102"
},
{
"cve": "CVE-2024-42106",
"cwe": {
"id": "CWE-908",
"name": "Use of Uninitialized Resource"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: inet_diag: Initialize pad field in struct inet_diag_req_v2.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-42106"
},
{
"cve": "CVE-2024-42131",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: mm: avoid overflows in dirty throttling logic The dirty throttling logic is interspersed with assumptions that dirty limits in PAGE_SIZE units fit into 32-bit (so that various multiplications fit into 64-bits). If limits end up being larger, we will hit overflows, possible divisions by 0 etc. Fix these problems by never allowing so large dirty limits as they have dubious practical value anyway. For dirty_bytes / dirty_background_bytes interfaces we can just refuse to set so large limits. For dirty_ratio / dirty_background_ratio it isn\u0027t so simple as the dirty limit is computed from the amount of available memory which can change due to memory hotplug etc. So when converting dirty limits from ratios to numbers of pages, we just don\u0027t allow the result to exceed UINT_MAX. This is root-only triggerable problem which occurs when the operator sets dirty limits to \u003e16 TB.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-42131"
},
{
"cve": "CVE-2024-42145",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "IB/core: an unbounded UMAD receive list, poses a risk of uncontrolled growth.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-42145"
},
{
"cve": "CVE-2024-42148",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "bnx2x: multiple UBSAN array-index-out-of-bounds.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-42148"
},
{
"cve": "CVE-2024-42152",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "nvmet: possible leak when destroy a ctrl during qp establishment.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-42152"
},
{
"cve": "CVE-2024-42153",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "i2c: pnx: potential deadlock warning from del_timer_sync() call in isr.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-42153"
},
{
"cve": "CVE-2024-42154",
"cwe": {
"id": "CWE-805",
"name": "Buffer Access with Incorrect Length Value"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: tcp_metrics: validate source addr length I don\u0027t see anything checking that TCP_METRICS_ATTR_SADDR_IPV4 is at least 4 bytes long, and the policy doesn\u0027t have an entry for this attribute at all (neither does it for IPv6 but v6 is manually validated).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-42154"
},
{
"cve": "CVE-2024-42161",
"cwe": {
"id": "CWE-457",
"name": "Use of Uninitialized Variable"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: bpf: Avoid uninitialized value in BPF_CORE_READ_BITFIELD.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-42161"
},
{
"cve": "CVE-2024-42223",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "media: dvb-frontends: tda10048: integer overflow state-\u003extal_hz can be up to 16M, so it can overflow a 32 bit integer when multiplied by pll_mfactor.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-42223"
},
{
"cve": "CVE-2024-42229",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "crypto: aead,cipher - key buffer after use not zeroized.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-42229"
},
{
"cve": "CVE-2024-42232",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "libceph: fix race between delayed_work() and ceph_monc_stop() The way the delayed work is handled in ceph_monc_stop() is prone to races with mon_fault() and possibly also finish_hunting(). Both of these can requeue the delayed work which wouldn\u0027t be canceled by any of the following code in case that happens after cancel_delayed_work_sync() runs -- __close_session() doesn\u0027t mess with the delayed work in order to avoid interfering with the hunting interval logic. This part was missed in(libceph: behave in mon_fault() if cur_mon \u003c \") and use-after-free can still ensue on monc and objects that hang off of it, with monc-\u003e auth and monc-\u003emonmap being particularly susceptible to quickly being reused.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-42232"
},
{
"cve": "CVE-2024-42236",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "usb: gadget: configfs: OOB read/write in usb_string_copy().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-42236"
},
{
"cve": "CVE-2024-42244",
"cwe": {
"id": "CWE-99",
"name": "Improper Control of Resource Identifiers (\u0027Resource Injection\u0027)"
},
"notes": [
{
"category": "summary",
"text": "USB: serial: mos7840: fix crash on resume Since(\"USB: serial: use generic method if no alternative is provided in usb serial layer\"), USB serial core calls the generic resume implementation when the driver has not provided one. This can trigger a crash on resume with mos7840 since support for multiple read URBs was added back in 2011. Specifically, both port read URBs are now submitted on resume for open ports, but the context pointer of the second URB is left set to the core rather than mos7840 port structure.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-42244"
},
{
"cve": "CVE-2024-42247",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "wireguard: allowedips: unaligned 64-bit memory accesses.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-42247"
},
{
"cve": "CVE-2024-43861",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "net: usb: qmi_wwan: memory leak for not ip packets.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-43861"
},
{
"cve": "CVE-2024-43871",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: devres: Fix memory leakage caused by driver API devm_free_percpu() It will cause memory leakage when use driver API devm_free_percpu() to free memory allocated by devm_alloc_percpu(), fixed by using devres_release() instead of devres_destroy() within devm_free_percpu().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-43871"
},
{
"cve": "CVE-2024-43880",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "mlxsw: spectrum_acl_erp: object nesting warning.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-43880"
},
{
"cve": "CVE-2024-43882",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "exec: the execution may gain unintended privileges.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-43882"
},
{
"cve": "CVE-2024-43883",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "usb: vhci-hcd: vulnerability due to the vhci-hcd driver dropping references before new ones were gained, potentially leading to the use of stale pointers.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-43883"
},
{
"cve": "CVE-2024-43889",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "padata: vulnerability due to a possible divide-by-zero error in padata_mt_helper() during bootup, caused by an uninitialized chunk_size being zero.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-43889"
},
{
"cve": "CVE-2024-43890",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "tracing: vulnerability due to an overflow in get_free_elt(), which could lead to infinite loops and CPU hangs when the tracing map becomes full.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-43890"
},
{
"cve": "CVE-2024-43893",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "serial: core: vulnerability due to a missing check for uartclk being zero, leading to a potential divide-by-zero error when calling ioctl TIOCSSERIAL with an invalid baud_base.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-43893"
},
{
"cve": "CVE-2024-44935",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "sctp: Fix null-ptr-deref in reuseport_add_sock(). A Null Pointer Dereference in reuseport_add_sock() while accessing sk2-\u003esk_reuseport_cb . The repro first creates a listener with SO_REUSEPORT. Then, it creates another listener on the same port and concurrently closes the first listener. The second listen() calls reuseport_add_sock() with the first listener as sk2, where sk2-\u003esk_reuseport_cb is not expected to be cleared concurrently, but the close() does clear it by reuseport_detach_sock().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-44935"
},
{
"cve": "CVE-2024-44944",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: netfilter: ctnetlink: use helper function to calculate expect ID Delete expectation path is missing a call to the nf_expect_get_id() helper function to calculate the expectation ID, otherwise LSB of the expectation object address is leaked to userspace.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-44944"
},
{
"cve": "CVE-2024-44949",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "parisc: fix a possible DMA corruption ARCH_DMA_MINALIGN was defined as 16 - this is too small - it may be possible that two unrelated 16-byte allocations share a cache line. If one of these allocations is written using DMA and the other is written using cached write, the value that was written with DMA may be corrupted.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-44949"
},
{
"cve": "CVE-2024-44952",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"notes": [
{
"category": "summary",
"text": "driver core: vulnerability due to a potential deadlock due to improper handling of device attributes and driver detachment, which has been fixed by using synchronize_rcu() to prevent race conditions.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-44952"
},
{
"cve": "CVE-2024-44960",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "usb: gadget: core: Check for unset descriptor. It needs to be reassured that the descriptor has been set before looking at maxpacket. This fixes a null pointer panic in this case. This may happen if the gadget doesn\u0027t properly set up the endpoint for the current speed, or the gadget descriptors are malformed and the descriptor for the speed/endpoint are not found. No current gadget driver is known to have this problem, but this may cause a hard-to-find bug during development of new gadgets.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-44960"
},
{
"cve": "CVE-2024-44971",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"notes": [
{
"category": "summary",
"text": "net: dsa: bcm_sf2: vulnerability caused a memory leak by not decrementing the reference count after finding and removing PHY devices, which has been fixed by adding a call to phy_device_free() to balance the reference count.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-44971"
},
{
"cve": "CVE-2024-44987",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: ipv6: prevent UAF in ip6_send_skb().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-44987"
},
{
"cve": "CVE-2024-44989",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: bonding: fix xfrm real_dev null pointer dereference.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-44989"
},
{
"cve": "CVE-2024-44990",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: bonding: fix null pointer deref in bond_ipsec_offload_ok We must check if there is an active slave before dereferencing the pointer.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-44990"
},
{
"cve": "CVE-2024-44995",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "net: hns3: a deadlock problem when config TC during resetting.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-44995"
},
{
"cve": "CVE-2024-44998",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "atm: idt77252: use after free in dequeue_rx().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-44998"
},
{
"cve": "CVE-2024-44999",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "gtp: missing network headers in gtp_dev_xmit().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-44999"
},
{
"cve": "CVE-2024-45003",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "vfs: Some filesystems(eg. ext4 with ea_inode feature, ubifs with xattr) may do inode lookup in the inode evicting callback function, if the inode lookup is operated under the inode lru traversing context, deadlock problems may happen.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-45003"
},
{
"cve": "CVE-2024-45006",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "xhci: Panther point NULL pointer deref at full-speed re-enumeration.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-45006"
},
{
"cve": "CVE-2024-45008",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "Input: missing limit on max slots results in too large allocation at input_mt_init_slots().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-45008"
},
{
"cve": "CVE-2024-45021",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "memcg_write_event_control(): a user-triggerable oops.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-45021"
},
{
"cve": "CVE-2024-45025",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "bitmap corruption on close_range() with CLOSE_RANGE_UNSHARE copy_fd_bitmaps.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-45025"
},
{
"cve": "CVE-2024-45490",
"cwe": {
"id": "CWE-131",
"name": "Incorrect Calculation of Buffer Size"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in libexpat before 2.6.3. xmlparse.c does not reject a negative length for XML_ParseBuffer.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-45490"
},
{
"cve": "CVE-2024-45491",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in libexpat before 2.6.3. dtdCopy in xmlparse.c can have an integer overflow for nDefaultAtts on 32-bit platforms (where UINT_MAX equals SIZE_MAX).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-45491"
},
{
"cve": "CVE-2024-45492",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in libexpat before 2.6.3. nextScaffoldPart in xmlparse.c can have an integer overflow for m_groupSize on 32-bit platforms (where UINT_MAX equals SIZE_MAX).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-45492"
},
{
"cve": "CVE-2024-46674",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "usb: dwc3: st: fix probed platform device ref count on probe error path. The probe function never performs any paltform device allocation, thus error path \"undo_platform_dev_alloc\" is entirely bogus. It drops the reference count from the platform device being probed. If error path is triggered, this will lead to unbalanced device reference counts and premature release of device resources, thus possible use-after-free when releasing remaining devm-managed resources.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-46674"
},
{
"cve": "CVE-2024-46675",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "usb: dwc3: core: A vulnerability where the USB core could access an invalid event buffer address during runtime suspend, potentially causing SMMU faults and other memory issues in Exynos platforms.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-46675"
},
{
"cve": "CVE-2024-46676",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "nfc: pn533: Add poll mod list filling check. In case of im_protocols value is 1 and tm_protocols value is 0 this combination successfully passes the check \u0027if (!im_protocols \u0026\u0026 !tm_protocols)\u0027 in the nfc_start_poll(). But then after pn533_poll_create_mod_list() call in pn533_start_poll() poll mod list will remain empty and dev-\u003epoll_mod_count will remain 0 which lead to division by zero.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-46676"
},
{
"cve": "CVE-2024-46677",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "gtp: fix NULL pointer dereference. When sockfd_lookup() fails, gtp_encap_enable_socket() returns a NULL pointer, but its callers only check for error pointers thus miss the NULL pointer case.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-46677"
},
{
"cve": "CVE-2024-46679",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: ethtool: check device is present when getting link settings.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-46679"
},
{
"cve": "CVE-2024-46685",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "pinctrl: single: fix NULL dereference in pcs_get_function(). pinmux_generic_get_function() can return NULL and the pointer \u0027function\u0027 was dereferenced without checking against NULL.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-46685"
},
{
"cve": "CVE-2024-46689",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "soc: qcom: cmd-db: Map shared memory as WC, not WB Linux does not write into cmd-db region. This region of memory is write protected by XPU. XPU may sometime falsely detect clean cache eviction as \"write\" into the write protected region leading to secure interrupt which causes an endless loop somewhere in Trust Zone.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-46689"
}
]
}
WID-SEC-W-2024-0475
Vulnerability from csaf_certbund - Published: 2024-02-25 23:00 - Updated: 2026-02-16 23:00Notes
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein lokaler Angreifer kann mehrere Schwachstellen im Linux-Kernel ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren oder einen nicht spezifizierten Angriff durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-0475 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0475.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-0475 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0475"
},
{
"category": "external",
"summary": "CVE Announce auf lore.kernel.org vom 2024-02-25",
"url": "http://lore.kernel.org/linux-cve-announce/2024022325-CVE-2023-52453-9f24%40gregkh/"
},
{
"category": "external",
"summary": "CVE Announce auf lore.kernel.org vom 2024-02-25",
"url": "http://lore.kernel.org/linux-cve-announce/2024022325-CVE-2024-26594-1cbc%40gregkh/"
},
{
"category": "external",
"summary": "CVE Announce auf lore.kernel.org vom 2024-02-25",
"url": "http://lore.kernel.org/linux-cve-announce/2024022330-CVE-2023-52454-5cf0%40gregkh/"
},
{
"category": "external",
"summary": "CVE Announce auf lore.kernel.org vom 2024-02-25",
"url": "http://lore.kernel.org/linux-cve-announce/2024022331-CVE-2023-52455-a28f%40gregkh/"
},
{
"category": "external",
"summary": "CVE Announce auf lore.kernel.org vom 2024-02-25",
"url": "http://lore.kernel.org/linux-cve-announce/2024022331-CVE-2023-52456-f9dd%40gregkh/"
},
{
"category": "external",
"summary": "CVE Announce auf lore.kernel.org vom 2024-02-25",
"url": "http://lore.kernel.org/linux-cve-announce/2024022332-CVE-2023-52457-c7b9%40gregkh/"
},
{
"category": "external",
"summary": "CVE Announce auf lore.kernel.org vom 2024-02-25",
"url": "http://lore.kernel.org/linux-cve-announce/2024022332-CVE-2023-52458-d1cd%40gregkh/"
},
{
"category": "external",
"summary": "CVE Announce auf lore.kernel.org vom 2024-02-25",
"url": "http://lore.kernel.org/linux-cve-announce/2024022333-CVE-2023-52459-f653%40gregkh/"
},
{
"category": "external",
"summary": "CVE Announce auf lore.kernel.org vom 2024-02-25",
"url": "http://lore.kernel.org/linux-cve-announce/2024022333-CVE-2023-52460-a52b%40gregkh/"
},
{
"category": "external",
"summary": "CVE Announce auf lore.kernel.org vom 2024-02-25",
"url": "http://lore.kernel.org/linux-cve-announce/2024022334-CVE-2023-52461-a619%40gregkh/"
},
{
"category": "external",
"summary": "CVE Announce auf lore.kernel.org vom 2024-02-25",
"url": "http://lore.kernel.org/linux-cve-announce/2024022335-CVE-2023-52462-b663%40gregkh/"
},
{
"category": "external",
"summary": "CVE Announce auf lore.kernel.org vom 2024-02-25",
"url": "http://lore.kernel.org/linux-cve-announce/2024022335-CVE-2023-52463-6195%40gregkh/"
},
{
"category": "external",
"summary": "CVE Announce auf lore.kernel.org vom 2024-02-25",
"url": "http://lore.kernel.org/linux-cve-announce/2024022336-CVE-2023-52464-b17c%40gregkh/"
},
{
"category": "external",
"summary": "CVE Announce auf lore.kernel.org vom 2024-02-25",
"url": "http://lore.kernel.org/linux-cve-announce/2024022336-CVE-2024-26595-9a8d%40gregkh/"
},
{
"category": "external",
"summary": "CVE Announce auf lore.kernel.org vom 2024-02-25",
"url": "http://lore.kernel.org/linux-cve-announce/2024022337-CVE-2024-26596-57cb%40gregkh/"
},
{
"category": "external",
"summary": "CVE Announce auf lore.kernel.org vom 2024-02-25",
"url": "http://lore.kernel.org/linux-cve-announce/2024022337-CVE-2024-26597-be75%40gregkh/"
},
{
"category": "external",
"summary": "CVE Announce auf lore.kernel.org vom 2024-02-25",
"url": "http://lore.kernel.org/linux-cve-announce/2024022338-CVE-2024-26598-24f4%40gregkh/"
},
{
"category": "external",
"summary": "CVE Announce auf lore.kernel.org vom 2024-02-25",
"url": "http://lore.kernel.org/linux-cve-announce/2024022338-CVE-2024-26599-cd65%40gregkh/"
},
{
"category": "external",
"summary": "CVE Announce auf lore.kernel.org vom 2024-02-25",
"url": "http://lore.kernel.org/linux-cve-announce/2024022405-CVE-2024-26600-44a2%40gregkh/"
},
{
"category": "external",
"summary": "CVE Announce auf lore.kernel.org vom 2024-02-25",
"url": "http://lore.kernel.org/linux-cve-announce/2024022411-CVE-2024-26601-b6ac%40gregkh/"
},
{
"category": "external",
"summary": "CVE Announce auf lore.kernel.org vom 2024-02-25",
"url": "http://lore.kernel.org/linux-cve-announce/2024022414-CVE-2024-26602-5e76%40gregkh/"
},
{
"category": "external",
"summary": "CVE Announce auf lore.kernel.org vom 2024-02-25",
"url": "http://lore.kernel.org/linux-cve-announce/2024022415-CVE-2024-26603-42c2%40gregkh/"
},
{
"category": "external",
"summary": "CVE Announce auf lore.kernel.org vom 2024-02-25",
"url": "http://lore.kernel.org/linux-cve-announce/2024022416-CVE-2024-26604-71a3%40gregkh/"
},
{
"category": "external",
"summary": "CVE Announce auf lore.kernel.org vom 2024-02-25",
"url": "http://lore.kernel.org/linux-cve-announce/2024022419-CVE-2024-26605-7b06%40gregkh/"
},
{
"category": "external",
"summary": "CVE Announce auf lore.kernel.org vom 2024-02-25",
"url": "http://lore.kernel.org/linux-cve-announce/2024022539-CVE-2023-52465-2e75%40gregkh/"
},
{
"category": "external",
"summary": "CVE Announce auf lore.kernel.org vom 2024-02-25",
"url": "http://lore.kernel.org/linux-cve-announce/2024022544-CVE-2023-52466-fea5%40gregkh/"
},
{
"category": "external",
"summary": "CVE Announce auf lore.kernel.org vom 2024-02-25",
"url": "http://lore.kernel.org/linux-cve-announce/2024022544-CVE-2023-52467-434b%40gregkh/"
},
{
"category": "external",
"summary": "CVE Announce auf lore.kernel.org vom 2024-02-25",
"url": "http://lore.kernel.org/linux-cve-announce/2024022545-CVE-2023-52468-59a2%40gregkh/"
},
{
"category": "external",
"summary": "CVE Announce auf lore.kernel.org vom 2024-02-25",
"url": "http://lore.kernel.org/linux-cve-announce/2024022546-CVE-2023-52469-5141%40gregkh/"
},
{
"category": "external",
"summary": "CVE Announce auf lore.kernel.org vom 2024-02-25",
"url": "http://lore.kernel.org/linux-cve-announce/2024022546-CVE-2023-52470-44d1%40gregkh/"
},
{
"category": "external",
"summary": "CVE Announce auf lore.kernel.org vom 2024-02-25",
"url": "http://lore.kernel.org/linux-cve-announce/2024022546-CVE-2023-52471-ab29%40gregkh/"
},
{
"category": "external",
"summary": "CVE Announce auf lore.kernel.org vom 2024-02-25",
"url": "http://lore.kernel.org/linux-cve-announce/2024022547-CVE-2023-52472-fa03%40gregkh/"
},
{
"category": "external",
"summary": "CVE Announce auf lore.kernel.org vom 2024-02-25",
"url": "http://lore.kernel.org/linux-cve-announce/2024022547-CVE-2023-52473-c3cc%40gregkh/"
},
{
"category": "external",
"summary": "VE Announce auf lore.kernel.org vom 2024-02-25",
"url": "http://lore.kernel.org/linux-cve-announce/2024022555-CVE-2021-46904-d49f%40gregkh/"
},
{
"category": "external",
"summary": "CVE Announce auf lore.kernel.org vom 2024-02-25",
"url": "http://lore.kernel.org/linux-cve-announce/2024022557-CVE-2021-46905-6507%40gregkh/"
},
{
"category": "external",
"summary": "CVE Announce auf lore.kernel.org vom 2024-02-25",
"url": "http://lore.kernel.org/linux-cve-announce/2024022558-CVE-2022-48626-8a90%40gregkh/"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.4-2024-061 vom 2024-03-06",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2024-061.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:1249 vom 2024-03-12",
"url": "https://access.redhat.com/errata/RHSA-2024:1249"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:1250 vom 2024-03-12",
"url": "https://access.redhat.com/errata/RHSA-2024:1250"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6688-1 vom 2024-03-11",
"url": "https://ubuntu.com/security/notices/USN-6688-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:0855-1 vom 2024-03-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:0858-1 vom 2024-03-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:0857-1 vom 2024-03-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:0856-1 vom 2024-03-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:1306 vom 2024-03-13",
"url": "https://access.redhat.com/errata/RHSA-2024:1306"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:0900-1 vom 2024-03-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:1332 vom 2024-03-14",
"url": "https://access.redhat.com/errata/RHSA-2024:1332"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:0900-2 vom 2024-03-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:0910-1 vom 2024-03-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6707-1 vom 2024-03-20",
"url": "https://ubuntu.com/security/notices/USN-6707-1"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-1249 vom 2024-03-21",
"url": "https://linux.oracle.com/errata/ELSA-2024-1249.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6707-2 vom 2024-03-21",
"url": "https://ubuntu.com/security/notices/USN-6707-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:0976-1 vom 2024-03-22",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-March/018185.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:0926-1 vom 2024-03-22",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:0975-1 vom 2024-03-22",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-March/018186.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:0925-1 vom 2024-03-22",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-March/018205.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:0977-1 vom 2024-03-22",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6707-3 vom 2024-03-26",
"url": "https://ubuntu.com/security/notices/USN-6707-3"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:1533 vom 2024-03-27",
"url": "https://access.redhat.com/errata/RHSA-2024:1533"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:1532 vom 2024-03-27",
"url": "https://access.redhat.com/errata/RHSA-2024:1532"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2024-040 vom 2024-04-01",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2024-040.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6707-4 vom 2024-03-28",
"url": "https://ubuntu.com/security/notices/USN-6707-4"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2024-052 vom 2024-04-01",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2024-052.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:1653 vom 2024-04-03",
"url": "https://access.redhat.com/errata/RHSA-2024:1653"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6725-1 vom 2024-04-09",
"url": "https://ubuntu.com/security/notices/USN-6725-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6726-1 vom 2024-04-09",
"url": "https://ubuntu.com/security/notices/USN-6726-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6726-2 vom 2024-04-16",
"url": "https://ubuntu.com/security/notices/USN-6726-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6725-2 vom 2024-04-16",
"url": "https://ubuntu.com/security/notices/USN-6725-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1320-1 vom 2024-04-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-April/018372.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1321-1 vom 2024-04-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-April/018375.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1322-1 vom 2024-04-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-April/018374.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6726-3 vom 2024-04-17",
"url": "https://ubuntu.com/security/notices/USN-6726-3"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1332-2 vom 2024-04-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1322-2 vom 2024-04-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1332-1 vom 2024-04-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-April/018376.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6740-1 vom 2024-04-19",
"url": "https://ubuntu.com/security/notices/USN-6740-1"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:2008 vom 2024-04-23",
"url": "https://access.redhat.com/errata/RHSA-2024:2008"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:2006 vom 2024-04-23",
"url": "https://access.redhat.com/errata/RHSA-2024:2006"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-2004 vom 2024-04-25",
"url": "http://linux.oracle.com/errata/ELSA-2024-2004.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1454-1 vom 2024-04-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-April/018431.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1466-1 vom 2024-04-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-April/018438.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:2394 vom 2024-04-30",
"url": "https://access.redhat.com/errata/RHSA-2024:2394"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1480-1 vom 2024-04-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-April/018444.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice LSN-0103-1 vom 2024-04-30",
"url": "https://ubuntu.com/security/notices/LSN-0103-1"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:2585 vom 2024-04-30",
"url": "https://access.redhat.com/errata/RHSA-2024:2585"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:2582 vom 2024-04-30",
"url": "https://access.redhat.com/errata/RHSA-2024:2582"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1490-1 vom 2024-05-03",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018445.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-5681 vom 2024-05-06",
"url": "https://lists.debian.org/debian-security-announce/2024/msg00090.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-5680 vom 2024-05-06",
"url": "https://lists.debian.org/debian-security-announce/2024/msg00089.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6767-1 vom 2024-05-07",
"url": "https://ubuntu.com/security/notices/USN-6767-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6766-1 vom 2024-05-07",
"url": "https://ubuntu.com/security/notices/USN-6766-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6765-1 vom 2024-05-07",
"url": "https://ubuntu.com/security/notices/USN-6765-1"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2024-198 vom 2024-05-08",
"url": "https://www.dell.com/support/kbdoc/000224827/dsa-2024-="
},
{
"category": "external",
"summary": "Insyde Security Advisory INSYDE-SA-2024002 vom 2024-05-14",
"url": "https://www.insyde.com/security-pledge/SA-2024002"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6767-2 vom 2024-05-14",
"url": "https://ubuntu.com/security/notices/USN-6767-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1648-1 vom 2024-05-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018524.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1644-1 vom 2024-05-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018528.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1643-1 vom 2024-05-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018529.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1646-1 vom 2024-05-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018526.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1641-1 vom 2024-05-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018531.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1647-1 vom 2024-05-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018525.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1659-1 vom 2024-05-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018538.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6766-2 vom 2024-05-15",
"url": "https://ubuntu.com/security/notices/USN-6766-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6766-3 vom 2024-05-20",
"url": "https://ubuntu.com/security/notices/USN-6766-3"
},
{
"category": "external",
"summary": "F5 Security Advisory K000139682 vom 2024-05-20",
"url": "https://my.f5.com/manage/s/article/K000139682"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1648-2 vom 2024-05-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018572.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:3138 vom 2024-05-22",
"url": "https://access.redhat.com/errata/RHSA-2024:3138"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:2950 vom 2024-05-22",
"url": "https://access.redhat.com/errata/RHSA-2024:2950"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6795-1 vom 2024-05-28",
"url": "https://ubuntu.com/security/notices/USN-6795-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1870-1 vom 2024-05-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018634.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:3618 vom 2024-06-05",
"url": "https://access.redhat.com/errata/RHSA-2024:3618"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:3627 vom 2024-06-05",
"url": "https://access.redhat.com/errata/RHSA-2024:3627"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-3618 vom 2024-06-06",
"url": "https://linux.oracle.com/errata/ELSA-2024-3618.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6820-1 vom 2024-06-08",
"url": "https://ubuntu.com/security/notices/USN-6820-1"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7156774 vom 2024-06-07",
"url": "https://www.ibm.com/support/pages/node/7156774"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6821-1 vom 2024-06-08",
"url": "https://ubuntu.com/security/notices/USN-6821-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6818-1 vom 2024-06-08",
"url": "https://ubuntu.com/security/notices/USN-6818-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6819-1 vom 2024-06-08",
"url": "https://ubuntu.com/security/notices/USN-6819-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6818-2 vom 2024-06-10",
"url": "https://ubuntu.com/security/notices/USN-6818-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6821-2 vom 2024-06-10",
"url": "https://ubuntu.com/security/notices/USN-6821-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6820-2 vom 2024-06-11",
"url": "https://ubuntu.com/security/notices/USN-6820-2"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:3810 vom 2024-06-11",
"url": "https://access.redhat.com/errata/RHSA-2024:3810"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6819-2 vom 2024-06-12",
"url": "https://ubuntu.com/security/notices/USN-6819-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6821-3 vom 2024-06-11",
"url": "https://ubuntu.com/security/notices/USN-6821-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6828-1 vom 2024-06-11",
"url": "https://ubuntu.com/security/notices/USN-6828-1"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:3855 vom 2024-06-12",
"url": "https://access.redhat.com/errata/RHSA-2024:3855"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:3854 vom 2024-06-12",
"url": "https://access.redhat.com/errata/RHSA-2024:3854"
},
{
"category": "external",
"summary": "Ubuntu Security Notice LSN-0104-1 vom 2024-06-11",
"url": "https://ubuntu.com/security/notices/LSN-0104-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2008-1 vom 2024-06-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-June/018706.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6819-3 vom 2024-06-12",
"url": "https://ubuntu.com/security/notices/USN-6819-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6821-4 vom 2024-06-14",
"url": "https://ubuntu.com/security/notices/USN-6821-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6818-3 vom 2024-06-14",
"url": "https://ubuntu.com/security/notices/USN-6818-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6818-4 vom 2024-06-19",
"url": "https://ubuntu.com/security/notices/USN-6818-4"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2135-1 vom 2024-06-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-June/018783.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-3841 vom 2024-06-25",
"url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-3842 vom 2024-06-25",
"url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2190-1 vom 2024-06-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-June/018819.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6819-4 vom 2024-06-26",
"url": "https://ubuntu.com/security/notices/USN-6819-4"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-3840 vom 2024-06-27",
"url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2024-2525 vom 2024-06-28",
"url": "https://alas.aws.amazon.com/AL2/ALAS-2024-2525.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:4211 vom 2024-07-02",
"url": "https://access.redhat.com/errata/RHSA-2024:4211"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2024-022 vom 2024-07-03",
"url": "https://www.dell.com/support/kbdoc/de-de/000226633/dsa-2024-022-security-update-for-dell-networker-vproxy-multiple-component-vulnerabilities"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-4211 vom 2024-07-03",
"url": "https://linux.oracle.com/errata/ELSA-2024-4211.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6871-1 vom 2024-07-04",
"url": "https://ubuntu.com/security/notices/USN-6871-1"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:4352 vom 2024-07-08",
"url": "https://access.redhat.com/errata/RHSA-2024:4352"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:4415 vom 2024-07-09",
"url": "https://access.redhat.com/errata/RHSA-2024:4415"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6892-1 vom 2024-07-10",
"url": "https://ubuntu.com/security/notices/USN-6892-1"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:4321 vom 2024-07-10",
"url": "https://access.redhat.com/errata/RHSA-2024:4321"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6895-1 vom 2024-07-12",
"url": "https://ubuntu.com/security/notices/USN-6895-1"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2024:4352 vom 2024-07-15",
"url": "https://errata.build.resf.org/RLSA-2024:4352"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2024:4211 vom 2024-07-15",
"url": "https://errata.build.resf.org/RLSA-2024:4211"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6895-2 vom 2024-07-16",
"url": "https://ubuntu.com/security/notices/USN-6895-2"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:4631 vom 2024-07-18",
"url": "https://access.redhat.com/errata/RHSA-2024:4631"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6895-3 vom 2024-07-19",
"url": "https://ubuntu.com/security/notices/USN-6895-3"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:4740 vom 2024-07-24",
"url": "https://access.redhat.com/errata/RHSA-2024:4740"
},
{
"category": "external",
"summary": "F5 Security Advisory K000140297 vom 2023-07-26",
"url": "https://my.f5.com/manage/s/article/K000140297"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6919-1 vom 2024-07-26",
"url": "https://ubuntu.com/security/notices/USN-6919-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6926-1 vom 2024-07-29",
"url": "https://ubuntu.com/security/notices/USN-6926-1"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7161794 vom 2024-07-29",
"url": "https://www.ibm.com/support/pages/node/7161794"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:4928 vom 2024-07-31",
"url": "https://access.redhat.com/errata/RHSA-2024:4928"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2024:4928 vom 2024-08-01",
"url": "https://errata.build.resf.org/RLSA-2024:4928"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6938-1 vom 2024-07-31",
"url": "https://ubuntu.com/security/notices/USN-6938-1"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7162077 vom 2024-07-31",
"url": "https://www.ibm.com/support/pages/node/7162077"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-4928 vom 2024-08-01",
"url": "https://linux.oracle.com/errata/ELSA-2024-4928.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6926-2 vom 2024-08-01",
"url": "https://ubuntu.com/security/notices/USN-6926-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6895-4 vom 2024-08-05",
"url": "https://ubuntu.com/security/notices/USN-6895-4"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2024-348 vom 2024-08-06",
"url": "https://www.dell.com/support/kbdoc/de-de/000227573/dsa-2024-348-security-update-for-dell-avamar-dell-networker-virtual-edition-nve-and-dell-powerprotect-dp-series-appliance-dell-integrated-data-protection-appliance-idpa-security-update-for-multiple-vulnerabilities"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:5067 vom 2024-08-07",
"url": "https://access.redhat.com/errata/RHSA-2024:5067"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:5066 vom 2024-08-07",
"url": "https://access.redhat.com/errata/RHSA-2024:5066"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2802-1 vom 2024-08-07",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:5102 vom 2024-08-08",
"url": "https://access.redhat.com/errata/RHSA-2024:5102"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:5101 vom 2024-08-08",
"url": "https://access.redhat.com/errata/RHSA-2024:5101"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6926-3 vom 2024-08-09",
"url": "https://ubuntu.com/security/notices/USN-6926-3"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-5101 vom 2024-08-09",
"url": "https://linux.oracle.com/errata/ELSA-2024-5101.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2896-1 vom 2024-08-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:5363 vom 2024-08-14",
"url": "https://access.redhat.com/errata/RHSA-2024:5363"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-5363 vom 2024-08-15",
"url": "https://linux.oracle.com/errata/ELSA-2024-5363.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1489-1 vom 2024-08-19",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/D5LYDXV5ACGHUYO5XWLWD5VAOA5HLJ7U/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1465-1 vom 2024-08-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2203-1 vom 2024-08-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1663-1 vom 2024-08-19",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/MFQEXBT2XPZQJMUF7MN6ZVO5FXVY4NKK/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1669-1 vom 2024-08-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019269.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2973-1 vom 2024-08-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:5672 vom 2024-08-21",
"url": "https://access.redhat.com/errata/RHSA-2024:5672"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:5673 vom 2024-08-21",
"url": "https://access.redhat.com/errata/RHSA-2024:5673"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6976-1 vom 2024-08-22",
"url": "https://ubuntu.com/security/notices/USN-6976-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6972-1 vom 2024-08-21",
"url": "https://ubuntu.com/security/notices/USN-6972-1"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2024:5102 vom 2024-08-21",
"url": "https://errata.build.resf.org/RLSA-2024:5102"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2024:5101 vom 2024-08-21",
"url": "https://errata.build.resf.org/RLSA-2024:5101"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6971-1 vom 2024-08-21",
"url": "https://ubuntu.com/security/notices/USN-6971-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6972-2 vom 2024-08-22",
"url": "https://ubuntu.com/security/notices/USN-6972-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6973-2 vom 2024-08-23",
"url": "https://ubuntu.com/security/notices/USN-6972-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6972-4 vom 2024-08-29",
"url": "https://ubuntu.com/security/notices/USN-6972-4"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7167662 vom 2024-09-05",
"url": "https://www.ibm.com/support/pages/node/7167662"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3190-1 vom 2024-09-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:6567 vom 2024-09-11",
"url": "https://access.redhat.com/errata/RHSA-2024:6567"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-6567 vom 2024-09-12",
"url": "https://linux.oracle.com/errata/ELSA-2024-6567.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3209-1 vom 2024-09-11",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/YNWVZVIFSX7PLBJX3I3PDZ4MIBERTN2Y/"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2024:6567 vom 2024-09-17",
"url": "https://errata.build.resf.org/RLSA-2024:6567"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:7001 vom 2024-09-24",
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7169778 vom 2024-09-24",
"url": "https://www.ibm.com/support/pages/node/7169778"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:7000 vom 2024-09-24",
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-7000 vom 2024-09-26",
"url": "https://linux.oracle.com/errata/ELSA-2024-7000.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3483-1 vom 2024-09-29",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2HO244EHQ65DPDJ2NOBAXLG7QYWSCUMA/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3483-1 vom 2024-09-29",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/2HO244EHQ65DPDJ2NOBAXLG7QYWSCUMA/"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2024:7001 vom 2024-09-30",
"url": "https://errata.build.resf.org/RLSA-2024:7001"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2024-422 vom 2024-10-10",
"url": "https://www.dell.com/support/kbdoc/de-de/000234730/dsa-2024-422-security-update-for-dell-networker-vproxy-multiple-component-vulnerabilities"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7069-1 vom 2024-10-16",
"url": "https://ubuntu.com/security/notices/USN-7069-1"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:8161 vom 2024-10-16",
"url": "https://access.redhat.com/errata/RHSA-2024:8161"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7069-2 vom 2024-10-17",
"url": "https://ubuntu.com/security/notices/USN-7069-2"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7173960 vom 2024-10-23",
"url": "https://www.ibm.com/support/pages/node/7173960"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:8318 vom 2024-10-23",
"url": "https://access.redhat.com/errata/RHSA-2024:8318"
},
{
"category": "external",
"summary": "IBM Security Bulletin",
"url": "https://www.ibm.com/support/pages/node/7174634"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:9315 vom 2024-11-12",
"url": "https://access.redhat.com/errata/RHSA-2024:9315"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:10771 vom 2024-12-04",
"url": "https://access.redhat.com/errata/RHSA-2024:10771"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4316-1 vom 2024-12-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/S4I5Z6ALCJLHTP25U3HMJHEXN4DR2USM/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4318-1 vom 2024-12-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4314-1 vom 2024-12-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/SARXL66CQHD5VSFG5PUBNBVBPVFUN4KT/"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7179045 vom 2024-12-16",
"url": "https://www.ibm.com/support/pages/node/7179045"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7180361 vom 2025-01-07",
"url": "https://www.ibm.com/support/pages/node/7180361"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA92874 vom 2024-01-09",
"url": "https://supportportal.juniper.net/s/article/2025-01-Security-Bulletin-Junos-Space-Multiple-vulnerabilities-resolved-in-24-1R2-release"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-9315 vom 2025-01-13",
"url": "https://oss.oracle.com/pipermail/el-errata/2025-January/017000.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7233-1 vom 2025-01-28",
"url": "https://ubuntu.com/security/notices/USN-7233-1"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025:14705-1 vom 2025-01-29",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0289-1 vom 2025-01-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7181933 vom 2025-01-29",
"url": "https://www.ibm.com/support/pages/node/7181933"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7233-2 vom 2025-01-30",
"url": "https://ubuntu.com/security/notices/USN-7233-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7233-3 vom 2025-02-03",
"url": "https://ubuntu.com/security/notices/USN-7233-3"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20095 vom 2025-02-11",
"url": "https://linux.oracle.com/errata/ELSA-2025-20095.html"
},
{
"category": "external",
"summary": "Brocade Security Advisory BSA-2025-2895 vom 2025-02-13",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25398"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7294-1 vom 2025-02-25",
"url": "https://ubuntu.com/security/notices/USN-7294-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7295-1 vom 2025-02-25",
"url": "https://ubuntu.com/security/notices/USN-7295-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7294-2 vom 2025-02-27",
"url": "https://ubuntu.com/security/notices/USN-7294-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7294-3 vom 2025-02-28",
"url": "https://ubuntu.com/security/notices/USN-7294-3"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4076 vom 2025-03-01",
"url": "https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7294-4 vom 2025-03-03",
"url": "https://ubuntu.com/security/notices/USN-7294-4"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:2490 vom 2025-03-10",
"url": "https://access.redhat.com/errata/RHSA-2025:2490"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:2705 vom 2025-03-18",
"url": "https://access.redhat.com/errata/RHSA-2025:2705"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:2696 vom 2025-03-19",
"url": "https://access.redhat.com/errata/RHSA-2025:2696"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7393-1 vom 2025-03-28",
"url": "https://ubuntu.com/security/notices/USN-7393-1"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7229443 vom 2025-03-28",
"url": "https://www.ibm.com/support/pages/node/7229443"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4102 vom 2025-04-01",
"url": "https://lists.debian.org/debian-lts-announce/2025/03/msg00028.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7401-1 vom 2025-04-01",
"url": "https://ubuntu.com/security/notices/USN-7401-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7413-1 vom 2025-04-03",
"url": "https://ubuntu.com/security/notices/USN-7413-1"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7230557 vom 2025-04-10",
"url": "https://www.ibm.com/support/pages/node/7230557"
},
{
"category": "external",
"summary": "Juniper Security Bulletin",
"url": "https://supportportal.juniper.net/s/article/2025-01-Security-Bulletin-Junos-Space-Multiple-vulnerabilities-resolved-in-24-1R2-release?language=en_US"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7496-1 vom 2025-05-07",
"url": "https://ubuntu.com/security/notices/USN-7496-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7496-2 vom 2025-05-07",
"url": "https://ubuntu.com/security/notices/USN-7496-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7496-5 vom 2025-05-07",
"url": "https://ubuntu.com/security/notices/USN-7496-5"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7496-4 vom 2025-05-07",
"url": "https://ubuntu.com/security/notices/USN-7496-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7496-3 vom 2025-05-07",
"url": "https://ubuntu.com/security/notices/USN-7496-3"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7233232 vom 2025-05-13",
"url": "https://www.ibm.com/support/pages/node/7233232"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7539-1 vom 2025-05-28",
"url": "https://ubuntu.com/security/notices/USN-7539-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7540-1 vom 2025-05-28",
"url": "https://ubuntu.com/security/notices/USN-7540-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20246-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20249-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20247-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7554-1 vom 2025-06-04",
"url": "https://ubuntu.com/security/notices/USN-7554-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7554-2 vom 2025-06-04",
"url": "https://ubuntu.com/security/notices/USN-7554-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7554-3 vom 2025-06-04",
"url": "https://ubuntu.com/security/notices/USN-7554-3"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20164-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20166-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20163-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20008-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021403.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20028-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html"
},
{
"category": "external",
"summary": "Siemens Security Advisory SSA-082556 vom 2025-06-10",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-082556.html"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7236419 vom 2025-06-30",
"url": "https://www.ibm.com/support/pages/node/7236419"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20319-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024176.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20291-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20324-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20323-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html"
}
],
"source_lang": "en-US",
"title": "Linux-Kernel: Mehrere Schwachstellen erm\u00f6glichen Denial of Service und unspezifische Angriffe",
"tracking": {
"current_release_date": "2026-02-16T23:00:00.000+00:00",
"generator": {
"date": "2026-02-17T09:25:39.503+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2024-0475",
"initial_release_date": "2024-02-25T23:00:00.000+00:00",
"revision_history": [
{
"date": "2024-02-25T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2024-03-05T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2024-03-11T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Red Hat und Ubuntu aufgenommen"
},
{
"date": "2024-03-12T23:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-03-13T23:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-03-14T23:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von SUSE und Red Hat aufgenommen"
},
{
"date": "2024-03-17T23:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-03-20T23:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Ubuntu und Oracle Linux aufgenommen"
},
{
"date": "2024-03-21T23:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-03-24T23:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-03-25T23:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-03-26T23:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-04-01T22:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von Amazon und Ubuntu aufgenommen"
},
{
"date": "2024-04-02T22:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-04-09T22:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-04-16T22:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von Ubuntu und SUSE aufgenommen"
},
{
"date": "2024-04-17T22:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-04-18T22:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-04-21T22:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-04-23T22:00:00.000+00:00",
"number": "20",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-04-24T22:00:00.000+00:00",
"number": "21",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2024-04-28T22:00:00.000+00:00",
"number": "22",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-04-29T22:00:00.000+00:00",
"number": "23",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-05-01T22:00:00.000+00:00",
"number": "24",
"summary": "Neue Updates von SUSE, Ubuntu und Red Hat aufgenommen"
},
{
"date": "2024-05-02T22:00:00.000+00:00",
"number": "25",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-05-06T22:00:00.000+00:00",
"number": "26",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2024-05-07T22:00:00.000+00:00",
"number": "27",
"summary": "Neue Updates von Ubuntu und Dell aufgenommen"
},
{
"date": "2024-05-13T22:00:00.000+00:00",
"number": "28",
"summary": "Neue Updates von Insyde aufgenommen"
},
{
"date": "2024-05-14T22:00:00.000+00:00",
"number": "29",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-05-15T22:00:00.000+00:00",
"number": "30",
"summary": "Neue Updates von SUSE und Ubuntu aufgenommen"
},
{
"date": "2024-05-20T22:00:00.000+00:00",
"number": "31",
"summary": "Neue Updates von Ubuntu und F5 aufgenommen"
},
{
"date": "2024-05-21T22:00:00.000+00:00",
"number": "32",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-05-28T22:00:00.000+00:00",
"number": "33",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-05-30T22:00:00.000+00:00",
"number": "34",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-06-04T22:00:00.000+00:00",
"number": "35",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-06-06T22:00:00.000+00:00",
"number": "36",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2024-06-09T22:00:00.000+00:00",
"number": "37",
"summary": "Neue Updates von Ubuntu und IBM aufgenommen"
},
{
"date": "2024-06-10T22:00:00.000+00:00",
"number": "38",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-06-11T22:00:00.000+00:00",
"number": "39",
"summary": "Neue Updates von Ubuntu und Red Hat aufgenommen"
},
{
"date": "2024-06-12T22:00:00.000+00:00",
"number": "40",
"summary": "Neue Updates von SUSE und Ubuntu aufgenommen"
},
{
"date": "2024-06-16T22:00:00.000+00:00",
"number": "41",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-06-18T22:00:00.000+00:00",
"number": "42",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-06-23T22:00:00.000+00:00",
"number": "43",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-06-25T22:00:00.000+00:00",
"number": "44",
"summary": "Neue Updates von Debian und SUSE aufgenommen"
},
{
"date": "2024-06-26T22:00:00.000+00:00",
"number": "45",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-06-27T22:00:00.000+00:00",
"number": "46",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2024-06-30T22:00:00.000+00:00",
"number": "47",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2024-07-01T22:00:00.000+00:00",
"number": "48",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-07-02T22:00:00.000+00:00",
"number": "49",
"summary": "Neue Updates von Dell und Oracle Linux aufgenommen"
},
{
"date": "2024-07-03T22:00:00.000+00:00",
"number": "50",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-07-07T22:00:00.000+00:00",
"number": "51",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-07-09T22:00:00.000+00:00",
"number": "52",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-07-10T22:00:00.000+00:00",
"number": "53",
"summary": "Neue Updates von Ubuntu und Red Hat aufgenommen"
},
{
"date": "2024-07-14T22:00:00.000+00:00",
"number": "54",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-07-15T22:00:00.000+00:00",
"number": "55",
"summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen"
},
{
"date": "2024-07-18T22:00:00.000+00:00",
"number": "56",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-07-23T22:00:00.000+00:00",
"number": "57",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-07-24T22:00:00.000+00:00",
"number": "58",
"summary": "Neue Updates von F5 aufgenommen"
},
{
"date": "2024-07-28T22:00:00.000+00:00",
"number": "59",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-07-29T22:00:00.000+00:00",
"number": "60",
"summary": "Neue Updates von Ubuntu und IBM aufgenommen"
},
{
"date": "2024-07-30T22:00:00.000+00:00",
"number": "61",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-07-31T22:00:00.000+00:00",
"number": "62",
"summary": "Neue Updates von Rocky Enterprise Software Foundation, Ubuntu, IBM und Oracle Linux aufgenommen"
},
{
"date": "2024-08-01T22:00:00.000+00:00",
"number": "63",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-08-04T22:00:00.000+00:00",
"number": "64",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-08-05T22:00:00.000+00:00",
"number": "65",
"summary": "Neue Updates von Dell aufgenommen"
},
{
"date": "2024-08-06T22:00:00.000+00:00",
"number": "66",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-08-07T22:00:00.000+00:00",
"number": "67",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-08-11T22:00:00.000+00:00",
"number": "68",
"summary": "Neue Updates von Ubuntu und Oracle Linux aufgenommen"
},
{
"date": "2024-08-13T22:00:00.000+00:00",
"number": "69",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-08-14T22:00:00.000+00:00",
"number": "70",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2024-08-19T22:00:00.000+00:00",
"number": "71",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-08-20T22:00:00.000+00:00",
"number": "72",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-08-21T22:00:00.000+00:00",
"number": "73",
"summary": "Neue Updates von Ubuntu und Rocky Enterprise Software Foundation aufgenommen"
},
{
"date": "2024-08-22T22:00:00.000+00:00",
"number": "74",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-08-25T22:00:00.000+00:00",
"number": "75",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-08-28T22:00:00.000+00:00",
"number": "76",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-09-05T22:00:00.000+00:00",
"number": "77",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2024-09-10T22:00:00.000+00:00",
"number": "78",
"summary": "Neue Updates von SUSE und Red Hat aufgenommen"
},
{
"date": "2024-09-11T22:00:00.000+00:00",
"number": "79",
"summary": "Neue Updates von Oracle Linux und SUSE aufgenommen"
},
{
"date": "2024-09-16T22:00:00.000+00:00",
"number": "80",
"summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen"
},
{
"date": "2024-09-23T22:00:00.000+00:00",
"number": "81",
"summary": "Neue Updates von Red Hat und IBM aufgenommen"
},
{
"date": "2024-09-25T22:00:00.000+00:00",
"number": "82",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2024-09-29T22:00:00.000+00:00",
"number": "83",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-09-30T22:00:00.000+00:00",
"number": "84",
"summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen"
},
{
"date": "2024-10-09T22:00:00.000+00:00",
"number": "85",
"summary": "Neue Updates von Dell aufgenommen"
},
{
"date": "2024-10-15T22:00:00.000+00:00",
"number": "86",
"summary": "Neue Updates von Ubuntu und Red Hat aufgenommen"
},
{
"date": "2024-10-17T22:00:00.000+00:00",
"number": "87",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-10-23T22:00:00.000+00:00",
"number": "88",
"summary": "Neue Updates von IBM und Red Hat aufgenommen"
},
{
"date": "2024-10-31T23:00:00.000+00:00",
"number": "89",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2024-11-12T23:00:00.000+00:00",
"number": "90",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-12-03T23:00:00.000+00:00",
"number": "91",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-12-15T23:00:00.000+00:00",
"number": "92",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-12-16T23:00:00.000+00:00",
"number": "93",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2025-01-06T23:00:00.000+00:00",
"number": "94",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2025-01-08T23:00:00.000+00:00",
"number": "95",
"summary": "Neue Updates von Juniper aufgenommen"
},
{
"date": "2025-01-13T23:00:00.000+00:00",
"number": "96",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-01-28T23:00:00.000+00:00",
"number": "97",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-01-29T23:00:00.000+00:00",
"number": "98",
"summary": "Neue Updates von openSUSE, SUSE und IBM aufgenommen"
},
{
"date": "2025-01-30T23:00:00.000+00:00",
"number": "99",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-02-03T23:00:00.000+00:00",
"number": "100",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-02-10T23:00:00.000+00:00",
"number": "101",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-02-13T23:00:00.000+00:00",
"number": "102",
"summary": "Neue Updates von BROCADE aufgenommen"
},
{
"date": "2025-02-25T23:00:00.000+00:00",
"number": "103",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-02-27T23:00:00.000+00:00",
"number": "104",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-03-02T23:00:00.000+00:00",
"number": "105",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2025-03-03T23:00:00.000+00:00",
"number": "106",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-03-09T23:00:00.000+00:00",
"number": "107",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-03-17T23:00:00.000+00:00",
"number": "108",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-03-19T23:00:00.000+00:00",
"number": "109",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-03-30T22:00:00.000+00:00",
"number": "110",
"summary": "Neue Updates von Ubuntu und IBM aufgenommen"
},
{
"date": "2025-03-31T22:00:00.000+00:00",
"number": "111",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2025-04-01T22:00:00.000+00:00",
"number": "112",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-04-03T22:00:00.000+00:00",
"number": "113",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-04-09T22:00:00.000+00:00",
"number": "114",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2025-04-10T22:00:00.000+00:00",
"number": "115",
"summary": "Neue Updates aufgenommen"
},
{
"date": "2025-05-06T22:00:00.000+00:00",
"number": "116",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-05-13T22:00:00.000+00:00",
"number": "117",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2025-05-27T22:00:00.000+00:00",
"number": "118",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-06-03T22:00:00.000+00:00",
"number": "119",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-06-04T22:00:00.000+00:00",
"number": "120",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-06-10T22:00:00.000+00:00",
"number": "121",
"summary": "Neue Updates von Siemens aufgenommen"
},
{
"date": "2025-06-30T22:00:00.000+00:00",
"number": "122",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2026-02-15T23:00:00.000+00:00",
"number": "123",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-16T23:00:00.000+00:00",
"number": "124",
"summary": "Neue Updates von SUSE aufgenommen"
}
],
"status": "final",
"version": "124"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "Broadcom Brocade SANnav",
"product": {
"name": "Broadcom Brocade SANnav",
"product_id": "T034392",
"product_identification_helper": {
"cpe": "cpe:/a:broadcom:brocade_sannav:-"
}
}
}
],
"category": "vendor",
"name": "Broadcom"
},
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Dell NetWorker",
"product": {
"name": "Dell NetWorker",
"product_id": "T024663",
"product_identification_helper": {
"cpe": "cpe:/a:dell:networker:-"
}
}
},
{
"category": "product_version",
"name": "virtual",
"product": {
"name": "Dell NetWorker virtual",
"product_id": "T034583",
"product_identification_helper": {
"cpe": "cpe:/a:dell:networker:virtual"
}
}
},
{
"category": "product_version_range",
"name": "\u003c19.11",
"product": {
"name": "Dell NetWorker \u003c19.11",
"product_id": "T035785"
}
},
{
"category": "product_version",
"name": "19.11",
"product": {
"name": "Dell NetWorker 19.11",
"product_id": "T035785-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:dell:networker:19.11"
}
}
}
],
"category": "product_name",
"name": "NetWorker"
}
],
"category": "vendor",
"name": "Dell"
},
{
"branches": [
{
"category": "product_name",
"name": "EMC Avamar",
"product": {
"name": "EMC Avamar",
"product_id": "T014381",
"product_identification_helper": {
"cpe": "cpe:/a:emc:avamar:-"
}
}
}
],
"category": "vendor",
"name": "EMC"
},
{
"branches": [
{
"category": "product_name",
"name": "F5 BIG-IP",
"product": {
"name": "F5 BIG-IP",
"product_id": "T001663",
"product_identification_helper": {
"cpe": "cpe:/a:f5:big-ip:-"
}
}
}
],
"category": "vendor",
"name": "F5"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "24.0.0",
"product": {
"name": "IBM Business Automation Workflow 24.0.0",
"product_id": "T036570",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:business_automation_workflow:24.0.0"
}
}
}
],
"category": "product_name",
"name": "Business Automation Workflow"
},
{
"branches": [
{
"category": "product_version",
"name": "on Cloud Pak for Data",
"product": {
"name": "IBM DB2 on Cloud Pak for Data",
"product_id": "T042208",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:db2:on_cloud_pak_for_data"
}
}
}
],
"category": "product_name",
"name": "DB2"
},
{
"category": "product_name",
"name": "IBM InfoSphere Guardium",
"product": {
"name": "IBM InfoSphere Guardium",
"product_id": "T002366",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:infosphere_guardium:-"
}
}
},
{
"branches": [
{
"category": "product_name",
"name": "IBM QRadar SIEM",
"product": {
"name": "IBM QRadar SIEM",
"product_id": "T021415",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:qradar_siem:-"
}
}
},
{
"category": "product_version_range",
"name": "\u003c7.5.0 UP10 IF01",
"product": {
"name": "IBM QRadar SIEM \u003c7.5.0 UP10 IF01",
"product_id": "T038741"
}
},
{
"category": "product_version",
"name": "7.5.0 UP10 IF01",
"product": {
"name": "IBM QRadar SIEM 7.5.0 UP10 IF01",
"product_id": "T038741-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:qradar_siem:7.5.0_up10_if01"
}
}
}
],
"category": "product_name",
"name": "QRadar SIEM"
},
{
"branches": [
{
"category": "product_version",
"name": "11.4",
"product": {
"name": "IBM Security Guardium 11.4",
"product_id": "1076561",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:security_guardium:11.4"
}
}
},
{
"category": "product_version",
"name": "11.5",
"product": {
"name": "IBM Security Guardium 11.5",
"product_id": "1411051",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:security_guardium:11.5"
}
}
},
{
"category": "product_version",
"name": "12",
"product": {
"name": "IBM Security Guardium 12.0",
"product_id": "T031092",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:security_guardium:12.0"
}
}
}
],
"category": "product_name",
"name": "Security Guardium"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c10.1.16.3",
"product": {
"name": "IBM Spectrum Protect Plus \u003c10.1.16.3",
"product_id": "T037795"
}
},
{
"category": "product_version",
"name": "10.1.16.3",
"product": {
"name": "IBM Spectrum Protect Plus 10.1.16.3",
"product_id": "T037795-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:spectrum_protect_plus:10.1.16.3"
}
}
},
{
"category": "product_version_range",
"name": "\u003c10.1.6.4",
"product": {
"name": "IBM Spectrum Protect Plus \u003c10.1.6.4",
"product_id": "T040030"
}
},
{
"category": "product_version",
"name": "10.1.6.4",
"product": {
"name": "IBM Spectrum Protect Plus 10.1.6.4",
"product_id": "T040030-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:spectrum_protect_plus:10.1.6.4"
}
}
},
{
"category": "product_version_range",
"name": "\u003c10.1.17",
"product": {
"name": "IBM Spectrum Protect Plus \u003c10.1.17",
"product_id": "T042730"
}
},
{
"category": "product_version",
"name": "10.1.17",
"product": {
"name": "IBM Spectrum Protect Plus 10.1.17",
"product_id": "T042730-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:spectrum_protect_plus:10.1.17"
}
}
},
{
"category": "product_version",
"name": "10.1",
"product": {
"name": "IBM Spectrum Protect Plus 10.1",
"product_id": "T043600",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:spectrum_protect_plus:10.1"
}
}
}
],
"category": "product_name",
"name": "Spectrum Protect Plus"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c6.1.9.5",
"product": {
"name": "IBM Storage Scale \u003c6.1.9.5",
"product_id": "T039851"
}
},
{
"category": "product_version",
"name": "6.1.9.5",
"product": {
"name": "IBM Storage Scale 6.1.9.5",
"product_id": "T039851-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:spectrum_scale:6.1.9.5"
}
}
},
{
"category": "product_version_range",
"name": "\u003c6.2.2.0",
"product": {
"name": "IBM Storage Scale \u003c6.2.2.0",
"product_id": "T039852"
}
},
{
"category": "product_version",
"name": "6.2.2.0",
"product": {
"name": "IBM Storage Scale 6.2.2.0",
"product_id": "T039852-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:spectrum_scale:6.2.2.0"
}
}
}
],
"category": "product_name",
"name": "Storage Scale"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c6.1.9.7",
"product": {
"name": "IBM Storage Scale System \u003c6.1.9.7",
"product_id": "T044961"
}
},
{
"category": "product_version",
"name": "6.1.9.7",
"product": {
"name": "IBM Storage Scale System 6.1.9.7",
"product_id": "T044961-fixed",
"product_identification_helper": {
"cpe": "cpe:/h:ibm:storage_scale_system:6.1.9.7"
}
}
},
{
"category": "product_version_range",
"name": "\u003c6.2.3.0",
"product": {
"name": "IBM Storage Scale System \u003c6.2.3.0",
"product_id": "T044962"
}
},
{
"category": "product_version",
"name": "6.2.3.0",
"product": {
"name": "IBM Storage Scale System 6.2.3.0",
"product_id": "T044962-fixed",
"product_identification_helper": {
"cpe": "cpe:/h:ibm:storage_scale_system:6.2.3.0"
}
}
}
],
"category": "product_name",
"name": "Storage Scale System"
}
],
"category": "vendor",
"name": "IBM"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel",
"product": {
"name": "Insyde UEFI Firmware kernel",
"product_id": "T034716",
"product_identification_helper": {
"cpe": "cpe:/h:insyde:uefi:kernel"
}
}
}
],
"category": "product_name",
"name": "UEFI Firmware"
}
],
"category": "vendor",
"name": "Insyde"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c24.1R2",
"product": {
"name": "Juniper Junos Space \u003c24.1R2",
"product_id": "T040074"
}
},
{
"category": "product_version",
"name": "24.1R2",
"product": {
"name": "Juniper Junos Space 24.1R2",
"product_id": "T040074-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:juniper:junos_space:24.1r2"
}
}
}
],
"category": "product_name",
"name": "Junos Space"
}
],
"category": "vendor",
"name": "Juniper"
},
{
"branches": [
{
"category": "product_name",
"name": "Open Source Linux Kernel",
"product": {
"name": "Open Source Linux Kernel",
"product_id": "T032006",
"product_identification_helper": {
"cpe": "cpe:/o:linux:linux_kernel:-"
}
}
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "RESF Rocky Linux",
"product": {
"name": "RESF Rocky Linux",
"product_id": "T032255",
"product_identification_helper": {
"cpe": "cpe:/o:resf:rocky_linux:-"
}
}
}
],
"category": "vendor",
"name": "RESF"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
},
{
"category": "product_name",
"name": "SUSE openSUSE",
"product": {
"name": "SUSE openSUSE",
"product_id": "T027843",
"product_identification_helper": {
"cpe": "cpe:/o:suse:opensuse:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "1500 CPU",
"product": {
"name": "Siemens SIMATIC S7 1500 CPU",
"product_id": "T025776",
"product_identification_helper": {
"cpe": "cpe:/h:siemens:simatic_s7:1500_cpu"
}
}
}
],
"category": "product_name",
"name": "SIMATIC S7"
}
],
"category": "vendor",
"name": "Siemens"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-46904",
"product_status": {
"known_affected": [
"T032006",
"67646",
"T034583",
"T042208",
"T004914",
"T038741",
"T039852",
"T037795",
"T039851",
"T040030",
"T040074",
"T042730",
"T043600",
"T021415",
"T031092",
"T024663",
"T001663",
"398363",
"T025776",
"T034716",
"1076561",
"T032255",
"T035785",
"T044962",
"T044961",
"T014381",
"T036570",
"2951",
"T002207",
"T034392",
"T000126",
"T027843",
"T002366",
"1411051"
]
},
"release_date": "2024-02-25T23:00:00.000+00:00",
"title": "CVE-2021-46904"
},
{
"cve": "CVE-2021-46905",
"product_status": {
"known_affected": [
"T032006",
"67646",
"T034583",
"T042208",
"T004914",
"T038741",
"T039852",
"T037795",
"T039851",
"T040030",
"T040074",
"T042730",
"T043600",
"T021415",
"T031092",
"T024663",
"T001663",
"398363",
"T025776",
"T034716",
"1076561",
"T032255",
"T035785",
"T044962",
"T044961",
"T014381",
"T036570",
"2951",
"T002207",
"T034392",
"T000126",
"T027843",
"T002366",
"1411051"
]
},
"release_date": "2024-02-25T23:00:00.000+00:00",
"title": "CVE-2021-46905"
},
{
"cve": "CVE-2022-48626",
"product_status": {
"known_affected": [
"T032006",
"67646",
"T034583",
"T042208",
"T004914",
"T038741",
"T039852",
"T037795",
"T039851",
"T040030",
"T040074",
"T042730",
"T043600",
"T021415",
"T031092",
"T024663",
"T001663",
"398363",
"T025776",
"T034716",
"1076561",
"T032255",
"T035785",
"T044962",
"T044961",
"T014381",
"T036570",
"2951",
"T002207",
"T034392",
"T000126",
"T027843",
"T002366",
"1411051"
]
},
"release_date": "2024-02-25T23:00:00.000+00:00",
"title": "CVE-2022-48626"
},
{
"cve": "CVE-2023-52453",
"product_status": {
"known_affected": [
"T032006",
"67646",
"T034583",
"T042208",
"T004914",
"T038741",
"T039852",
"T037795",
"T039851",
"T040030",
"T040074",
"T042730",
"T043600",
"T021415",
"T031092",
"T024663",
"T001663",
"398363",
"T025776",
"T034716",
"1076561",
"T032255",
"T035785",
"T044962",
"T044961",
"T014381",
"T036570",
"2951",
"T002207",
"T034392",
"T000126",
"T027843",
"T002366",
"1411051"
]
},
"release_date": "2024-02-25T23:00:00.000+00:00",
"title": "CVE-2023-52453"
},
{
"cve": "CVE-2023-52454",
"product_status": {
"known_affected": [
"T032006",
"67646",
"T034583",
"T042208",
"T004914",
"T038741",
"T039852",
"T037795",
"T039851",
"T040030",
"T040074",
"T042730",
"T043600",
"T021415",
"T031092",
"T024663",
"T001663",
"398363",
"T025776",
"T034716",
"1076561",
"T032255",
"T035785",
"T044962",
"T044961",
"T014381",
"T036570",
"2951",
"T002207",
"T034392",
"T000126",
"T027843",
"T002366",
"1411051"
]
},
"release_date": "2024-02-25T23:00:00.000+00:00",
"title": "CVE-2023-52454"
},
{
"cve": "CVE-2023-52455",
"product_status": {
"known_affected": [
"T032006",
"67646",
"T034583",
"T042208",
"T004914",
"T038741",
"T039852",
"T037795",
"T039851",
"T040030",
"T040074",
"T042730",
"T043600",
"T021415",
"T031092",
"T024663",
"T001663",
"398363",
"T025776",
"T034716",
"1076561",
"T032255",
"T035785",
"T044962",
"T044961",
"T014381",
"T036570",
"2951",
"T002207",
"T034392",
"T000126",
"T027843",
"T002366",
"1411051"
]
},
"release_date": "2024-02-25T23:00:00.000+00:00",
"title": "CVE-2023-52455"
},
{
"cve": "CVE-2023-52456",
"product_status": {
"known_affected": [
"T032006",
"67646",
"T034583",
"T042208",
"T004914",
"T038741",
"T039852",
"T037795",
"T039851",
"T040030",
"T040074",
"T042730",
"T043600",
"T021415",
"T031092",
"T024663",
"T001663",
"398363",
"T025776",
"T034716",
"1076561",
"T032255",
"T035785",
"T044962",
"T044961",
"T014381",
"T036570",
"2951",
"T002207",
"T034392",
"T000126",
"T027843",
"T002366",
"1411051"
]
},
"release_date": "2024-02-25T23:00:00.000+00:00",
"title": "CVE-2023-52456"
},
{
"cve": "CVE-2023-52457",
"product_status": {
"known_affected": [
"T032006",
"67646",
"T034583",
"T042208",
"T004914",
"T038741",
"T039852",
"T037795",
"T039851",
"T040030",
"T040074",
"T042730",
"T043600",
"T021415",
"T031092",
"T024663",
"T001663",
"398363",
"T025776",
"T034716",
"1076561",
"T032255",
"T035785",
"T044962",
"T044961",
"T014381",
"T036570",
"2951",
"T002207",
"T034392",
"T000126",
"T027843",
"T002366",
"1411051"
]
},
"release_date": "2024-02-25T23:00:00.000+00:00",
"title": "CVE-2023-52457"
},
{
"cve": "CVE-2023-52458",
"product_status": {
"known_affected": [
"T032006",
"67646",
"T034583",
"T042208",
"T004914",
"T038741",
"T039852",
"T037795",
"T039851",
"T040030",
"T040074",
"T042730",
"T043600",
"T021415",
"T031092",
"T024663",
"T001663",
"398363",
"T025776",
"T034716",
"1076561",
"T032255",
"T035785",
"T044962",
"T044961",
"T014381",
"T036570",
"2951",
"T002207",
"T034392",
"T000126",
"T027843",
"T002366",
"1411051"
]
},
"release_date": "2024-02-25T23:00:00.000+00:00",
"title": "CVE-2023-52458"
},
{
"cve": "CVE-2023-52459",
"product_status": {
"known_affected": [
"T032006",
"67646",
"T034583",
"T042208",
"T004914",
"T038741",
"T039852",
"T037795",
"T039851",
"T040030",
"T040074",
"T042730",
"T043600",
"T021415",
"T031092",
"T024663",
"T001663",
"398363",
"T025776",
"T034716",
"1076561",
"T032255",
"T035785",
"T044962",
"T044961",
"T014381",
"T036570",
"2951",
"T002207",
"T034392",
"T000126",
"T027843",
"T002366",
"1411051"
]
},
"release_date": "2024-02-25T23:00:00.000+00:00",
"title": "CVE-2023-52459"
},
{
"cve": "CVE-2023-52460",
"product_status": {
"known_affected": [
"T032006",
"67646",
"T034583",
"T042208",
"T004914",
"T038741",
"T039852",
"T037795",
"T039851",
"T040030",
"T040074",
"T042730",
"T043600",
"T021415",
"T031092",
"T024663",
"T001663",
"398363",
"T025776",
"T034716",
"1076561",
"T032255",
"T035785",
"T044962",
"T044961",
"T014381",
"T036570",
"2951",
"T002207",
"T034392",
"T000126",
"T027843",
"T002366",
"1411051"
]
},
"release_date": "2024-02-25T23:00:00.000+00:00",
"title": "CVE-2023-52460"
},
{
"cve": "CVE-2023-52461",
"product_status": {
"known_affected": [
"T032006",
"67646",
"T034583",
"T042208",
"T004914",
"T038741",
"T039852",
"T037795",
"T039851",
"T040030",
"T040074",
"T042730",
"T043600",
"T021415",
"T031092",
"T024663",
"T001663",
"398363",
"T025776",
"T034716",
"1076561",
"T032255",
"T035785",
"T044962",
"T044961",
"T014381",
"T036570",
"2951",
"T002207",
"T034392",
"T000126",
"T027843",
"T002366",
"1411051"
]
},
"release_date": "2024-02-25T23:00:00.000+00:00",
"title": "CVE-2023-52461"
},
{
"cve": "CVE-2023-52462",
"product_status": {
"known_affected": [
"T032006",
"67646",
"T034583",
"T042208",
"T004914",
"T038741",
"T039852",
"T037795",
"T039851",
"T040030",
"T040074",
"T042730",
"T043600",
"T021415",
"T031092",
"T024663",
"T001663",
"398363",
"T025776",
"T034716",
"1076561",
"T032255",
"T035785",
"T044962",
"T044961",
"T014381",
"T036570",
"2951",
"T002207",
"T034392",
"T000126",
"T027843",
"T002366",
"1411051"
]
},
"release_date": "2024-02-25T23:00:00.000+00:00",
"title": "CVE-2023-52462"
},
{
"cve": "CVE-2023-52463",
"product_status": {
"known_affected": [
"T032006",
"67646",
"T034583",
"T042208",
"T004914",
"T038741",
"T039852",
"T037795",
"T039851",
"T040030",
"T040074",
"T042730",
"T043600",
"T021415",
"T031092",
"T024663",
"T001663",
"398363",
"T025776",
"T034716",
"1076561",
"T032255",
"T035785",
"T044962",
"T044961",
"T014381",
"T036570",
"2951",
"T002207",
"T034392",
"T000126",
"T027843",
"T002366",
"1411051"
]
},
"release_date": "2024-02-25T23:00:00.000+00:00",
"title": "CVE-2023-52463"
},
{
"cve": "CVE-2023-52464",
"product_status": {
"known_affected": [
"T032006",
"67646",
"T034583",
"T042208",
"T004914",
"T038741",
"T039852",
"T037795",
"T039851",
"T040030",
"T040074",
"T042730",
"T043600",
"T021415",
"T031092",
"T024663",
"T001663",
"398363",
"T025776",
"T034716",
"1076561",
"T032255",
"T035785",
"T044962",
"T044961",
"T014381",
"T036570",
"2951",
"T002207",
"T034392",
"T000126",
"T027843",
"T002366",
"1411051"
]
},
"release_date": "2024-02-25T23:00:00.000+00:00",
"title": "CVE-2023-52464"
},
{
"cve": "CVE-2023-52465",
"product_status": {
"known_affected": [
"T032006",
"67646",
"T034583",
"T042208",
"T004914",
"T038741",
"T039852",
"T037795",
"T039851",
"T040030",
"T040074",
"T042730",
"T043600",
"T021415",
"T031092",
"T024663",
"T001663",
"398363",
"T025776",
"T034716",
"1076561",
"T032255",
"T035785",
"T044962",
"T044961",
"T014381",
"T036570",
"2951",
"T002207",
"T034392",
"T000126",
"T027843",
"T002366",
"1411051"
]
},
"release_date": "2024-02-25T23:00:00.000+00:00",
"title": "CVE-2023-52465"
},
{
"cve": "CVE-2023-52466",
"product_status": {
"known_affected": [
"T032006",
"67646",
"T034583",
"T042208",
"T004914",
"T038741",
"T039852",
"T037795",
"T039851",
"T040030",
"T040074",
"T042730",
"T043600",
"T021415",
"T031092",
"T024663",
"T001663",
"398363",
"T025776",
"T034716",
"1076561",
"T032255",
"T035785",
"T044962",
"T044961",
"T014381",
"T036570",
"2951",
"T002207",
"T034392",
"T000126",
"T027843",
"T002366",
"1411051"
]
},
"release_date": "2024-02-25T23:00:00.000+00:00",
"title": "CVE-2023-52466"
},
{
"cve": "CVE-2023-52467",
"product_status": {
"known_affected": [
"T032006",
"67646",
"T034583",
"T042208",
"T004914",
"T038741",
"T039852",
"T037795",
"T039851",
"T040030",
"T040074",
"T042730",
"T043600",
"T021415",
"T031092",
"T024663",
"T001663",
"398363",
"T025776",
"T034716",
"1076561",
"T032255",
"T035785",
"T044962",
"T044961",
"T014381",
"T036570",
"2951",
"T002207",
"T034392",
"T000126",
"T027843",
"T002366",
"1411051"
]
},
"release_date": "2024-02-25T23:00:00.000+00:00",
"title": "CVE-2023-52467"
},
{
"cve": "CVE-2023-52468",
"product_status": {
"known_affected": [
"T032006",
"67646",
"T034583",
"T042208",
"T004914",
"T038741",
"T039852",
"T037795",
"T039851",
"T040030",
"T040074",
"T042730",
"T043600",
"T021415",
"T031092",
"T024663",
"T001663",
"398363",
"T025776",
"T034716",
"1076561",
"T032255",
"T035785",
"T044962",
"T044961",
"T014381",
"T036570",
"2951",
"T002207",
"T034392",
"T000126",
"T027843",
"T002366",
"1411051"
]
},
"release_date": "2024-02-25T23:00:00.000+00:00",
"title": "CVE-2023-52468"
},
{
"cve": "CVE-2023-52469",
"product_status": {
"known_affected": [
"T032006",
"67646",
"T034583",
"T042208",
"T004914",
"T038741",
"T039852",
"T037795",
"T039851",
"T040030",
"T040074",
"T042730",
"T043600",
"T021415",
"T031092",
"T024663",
"T001663",
"398363",
"T025776",
"T034716",
"1076561",
"T032255",
"T035785",
"T044962",
"T044961",
"T014381",
"T036570",
"2951",
"T002207",
"T034392",
"T000126",
"T027843",
"T002366",
"1411051"
]
},
"release_date": "2024-02-25T23:00:00.000+00:00",
"title": "CVE-2023-52469"
},
{
"cve": "CVE-2023-52470",
"product_status": {
"known_affected": [
"T032006",
"67646",
"T034583",
"T042208",
"T004914",
"T038741",
"T039852",
"T037795",
"T039851",
"T040030",
"T040074",
"T042730",
"T043600",
"T021415",
"T031092",
"T024663",
"T001663",
"398363",
"T025776",
"T034716",
"1076561",
"T032255",
"T035785",
"T044962",
"T044961",
"T014381",
"T036570",
"2951",
"T002207",
"T034392",
"T000126",
"T027843",
"T002366",
"1411051"
]
},
"release_date": "2024-02-25T23:00:00.000+00:00",
"title": "CVE-2023-52470"
},
{
"cve": "CVE-2023-52471",
"product_status": {
"known_affected": [
"T032006",
"67646",
"T034583",
"T042208",
"T004914",
"T038741",
"T039852",
"T037795",
"T039851",
"T040030",
"T040074",
"T042730",
"T043600",
"T021415",
"T031092",
"T024663",
"T001663",
"398363",
"T025776",
"T034716",
"1076561",
"T032255",
"T035785",
"T044962",
"T044961",
"T014381",
"T036570",
"2951",
"T002207",
"T034392",
"T000126",
"T027843",
"T002366",
"1411051"
]
},
"release_date": "2024-02-25T23:00:00.000+00:00",
"title": "CVE-2023-52471"
},
{
"cve": "CVE-2023-52472",
"product_status": {
"known_affected": [
"T032006",
"67646",
"T034583",
"T042208",
"T004914",
"T038741",
"T039852",
"T037795",
"T039851",
"T040030",
"T040074",
"T042730",
"T043600",
"T021415",
"T031092",
"T024663",
"T001663",
"398363",
"T025776",
"T034716",
"1076561",
"T032255",
"T035785",
"T044962",
"T044961",
"T014381",
"T036570",
"2951",
"T002207",
"T034392",
"T000126",
"T027843",
"T002366",
"1411051"
]
},
"release_date": "2024-02-25T23:00:00.000+00:00",
"title": "CVE-2023-52472"
},
{
"cve": "CVE-2023-52473",
"product_status": {
"known_affected": [
"T032006",
"67646",
"T034583",
"T042208",
"T004914",
"T038741",
"T039852",
"T037795",
"T039851",
"T040030",
"T040074",
"T042730",
"T043600",
"T021415",
"T031092",
"T024663",
"T001663",
"398363",
"T025776",
"T034716",
"1076561",
"T032255",
"T035785",
"T044962",
"T044961",
"T014381",
"T036570",
"2951",
"T002207",
"T034392",
"T000126",
"T027843",
"T002366",
"1411051"
]
},
"release_date": "2024-02-25T23:00:00.000+00:00",
"title": "CVE-2023-52473"
},
{
"cve": "CVE-2024-26594",
"product_status": {
"known_affected": [
"T032006",
"67646",
"T034583",
"T042208",
"T004914",
"T038741",
"T039852",
"T037795",
"T039851",
"T040030",
"T040074",
"T042730",
"T043600",
"T021415",
"T031092",
"T024663",
"T001663",
"398363",
"T025776",
"T034716",
"1076561",
"T032255",
"T035785",
"T044962",
"T044961",
"T014381",
"T036570",
"2951",
"T002207",
"T034392",
"T000126",
"T027843",
"T002366",
"1411051"
]
},
"release_date": "2024-02-25T23:00:00.000+00:00",
"title": "CVE-2024-26594"
},
{
"cve": "CVE-2024-26595",
"product_status": {
"known_affected": [
"T032006",
"67646",
"T034583",
"T042208",
"T004914",
"T038741",
"T039852",
"T037795",
"T039851",
"T040030",
"T040074",
"T042730",
"T043600",
"T021415",
"T031092",
"T024663",
"T001663",
"398363",
"T025776",
"T034716",
"1076561",
"T032255",
"T035785",
"T044962",
"T044961",
"T014381",
"T036570",
"2951",
"T002207",
"T034392",
"T000126",
"T027843",
"T002366",
"1411051"
]
},
"release_date": "2024-02-25T23:00:00.000+00:00",
"title": "CVE-2024-26595"
},
{
"cve": "CVE-2024-26596",
"product_status": {
"known_affected": [
"T032006",
"67646",
"T034583",
"T042208",
"T004914",
"T038741",
"T039852",
"T037795",
"T039851",
"T040030",
"T040074",
"T042730",
"T043600",
"T021415",
"T031092",
"T024663",
"T001663",
"398363",
"T025776",
"T034716",
"1076561",
"T032255",
"T035785",
"T044962",
"T044961",
"T014381",
"T036570",
"2951",
"T002207",
"T034392",
"T000126",
"T027843",
"T002366",
"1411051"
]
},
"release_date": "2024-02-25T23:00:00.000+00:00",
"title": "CVE-2024-26596"
},
{
"cve": "CVE-2024-26597",
"product_status": {
"known_affected": [
"T032006",
"67646",
"T034583",
"T042208",
"T004914",
"T038741",
"T039852",
"T037795",
"T039851",
"T040030",
"T040074",
"T042730",
"T043600",
"T021415",
"T031092",
"T024663",
"T001663",
"398363",
"T025776",
"T034716",
"1076561",
"T032255",
"T035785",
"T044962",
"T044961",
"T014381",
"T036570",
"2951",
"T002207",
"T034392",
"T000126",
"T027843",
"T002366",
"1411051"
]
},
"release_date": "2024-02-25T23:00:00.000+00:00",
"title": "CVE-2024-26597"
},
{
"cve": "CVE-2024-26598",
"product_status": {
"known_affected": [
"T032006",
"67646",
"T034583",
"T042208",
"T004914",
"T038741",
"T039852",
"T037795",
"T039851",
"T040030",
"T040074",
"T042730",
"T043600",
"T021415",
"T031092",
"T024663",
"T001663",
"398363",
"T025776",
"T034716",
"1076561",
"T032255",
"T035785",
"T044962",
"T044961",
"T014381",
"T036570",
"2951",
"T002207",
"T034392",
"T000126",
"T027843",
"T002366",
"1411051"
]
},
"release_date": "2024-02-25T23:00:00.000+00:00",
"title": "CVE-2024-26598"
},
{
"cve": "CVE-2024-26599",
"product_status": {
"known_affected": [
"T032006",
"67646",
"T034583",
"T042208",
"T004914",
"T038741",
"T039852",
"T037795",
"T039851",
"T040030",
"T040074",
"T042730",
"T043600",
"T021415",
"T031092",
"T024663",
"T001663",
"398363",
"T025776",
"T034716",
"1076561",
"T032255",
"T035785",
"T044962",
"T044961",
"T014381",
"T036570",
"2951",
"T002207",
"T034392",
"T000126",
"T027843",
"T002366",
"1411051"
]
},
"release_date": "2024-02-25T23:00:00.000+00:00",
"title": "CVE-2024-26599"
},
{
"cve": "CVE-2024-26600",
"product_status": {
"known_affected": [
"T032006",
"67646",
"T034583",
"T042208",
"T004914",
"T038741",
"T039852",
"T037795",
"T039851",
"T040030",
"T040074",
"T042730",
"T043600",
"T021415",
"T031092",
"T024663",
"T001663",
"398363",
"T025776",
"T034716",
"1076561",
"T032255",
"T035785",
"T044962",
"T044961",
"T014381",
"T036570",
"2951",
"T002207",
"T034392",
"T000126",
"T027843",
"T002366",
"1411051"
]
},
"release_date": "2024-02-25T23:00:00.000+00:00",
"title": "CVE-2024-26600"
},
{
"cve": "CVE-2024-26601",
"product_status": {
"known_affected": [
"T032006",
"67646",
"T034583",
"T042208",
"T004914",
"T038741",
"T039852",
"T037795",
"T039851",
"T040030",
"T040074",
"T042730",
"T043600",
"T021415",
"T031092",
"T024663",
"T001663",
"398363",
"T025776",
"T034716",
"1076561",
"T032255",
"T035785",
"T044962",
"T044961",
"T014381",
"T036570",
"2951",
"T002207",
"T034392",
"T000126",
"T027843",
"T002366",
"1411051"
]
},
"release_date": "2024-02-25T23:00:00.000+00:00",
"title": "CVE-2024-26601"
},
{
"cve": "CVE-2024-26602",
"product_status": {
"known_affected": [
"T032006",
"67646",
"T034583",
"T042208",
"T004914",
"T038741",
"T039852",
"T037795",
"T039851",
"T040030",
"T040074",
"T042730",
"T043600",
"T021415",
"T031092",
"T024663",
"T001663",
"398363",
"T025776",
"T034716",
"1076561",
"T032255",
"T035785",
"T044962",
"T044961",
"T014381",
"T036570",
"2951",
"T002207",
"T034392",
"T000126",
"T027843",
"T002366",
"1411051"
]
},
"release_date": "2024-02-25T23:00:00.000+00:00",
"title": "CVE-2024-26602"
},
{
"cve": "CVE-2024-26603",
"product_status": {
"known_affected": [
"T032006",
"67646",
"T034583",
"T042208",
"T004914",
"T038741",
"T039852",
"T037795",
"T039851",
"T040030",
"T040074",
"T042730",
"T043600",
"T021415",
"T031092",
"T024663",
"T001663",
"398363",
"T025776",
"T034716",
"1076561",
"T032255",
"T035785",
"T044962",
"T044961",
"T014381",
"T036570",
"2951",
"T002207",
"T034392",
"T000126",
"T027843",
"T002366",
"1411051"
]
},
"release_date": "2024-02-25T23:00:00.000+00:00",
"title": "CVE-2024-26603"
},
{
"cve": "CVE-2024-26604",
"product_status": {
"known_affected": [
"T032006",
"67646",
"T034583",
"T042208",
"T004914",
"T038741",
"T039852",
"T037795",
"T039851",
"T040030",
"T040074",
"T042730",
"T043600",
"T021415",
"T031092",
"T024663",
"T001663",
"398363",
"T025776",
"T034716",
"1076561",
"T032255",
"T035785",
"T044962",
"T044961",
"T014381",
"T036570",
"2951",
"T002207",
"T034392",
"T000126",
"T027843",
"T002366",
"1411051"
]
},
"release_date": "2024-02-25T23:00:00.000+00:00",
"title": "CVE-2024-26604"
},
{
"cve": "CVE-2024-26605",
"product_status": {
"known_affected": [
"T032006",
"67646",
"T034583",
"T042208",
"T004914",
"T038741",
"T039852",
"T037795",
"T039851",
"T040030",
"T040074",
"T042730",
"T043600",
"T021415",
"T031092",
"T024663",
"T001663",
"398363",
"T025776",
"T034716",
"1076561",
"T032255",
"T035785",
"T044962",
"T044961",
"T014381",
"T036570",
"2951",
"T002207",
"T034392",
"T000126",
"T027843",
"T002366",
"1411051"
]
},
"release_date": "2024-02-25T23:00:00.000+00:00",
"title": "CVE-2024-26605"
}
]
}
RHSA-2024:8161
Vulnerability from csaf_redhat - Published: 2024-10-16 00:36 - Updated: 2026-01-28 15:34Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions, and Red Hat Enterprise Linux 8.6 Telecommunications Update Service.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: kvm: Avoid potential UAF in LPI translation cache (CVE-2024-26598)\n\n* kernel: i40e: Do not allow untrusted VF to remove administratively set MAC (CVE-2024-26830)\n\n* kernel: udp: do not accept non-tunnel GSO skbs landing in a tunnel (CVE-2024-35884)\n\n* kernel: mlxsw: spectrum: Protect driver from buggy firmware (CVE-2021-47560)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:8161",
"url": "https://access.redhat.com/errata/RHSA-2024:8161"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2265801",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265801"
},
{
"category": "external",
"summary": "2275596",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2275596"
},
{
"category": "external",
"summary": "2281704",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2281704"
},
{
"category": "external",
"summary": "2283389",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2283389"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_8161.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2026-01-28T15:34:57+00:00",
"generator": {
"date": "2026-01-28T15:34:57+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.16"
}
},
"id": "RHSA-2024:8161",
"initial_release_date": "2024-10-16T00:36:58+00:00",
"revision_history": [
{
"date": "2024-10-16T00:36:58+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-10-16T00:36:58+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-01-28T15:34:57+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:8.6::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:8.6::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:8.6::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-372.126.1.el8_6.x86_64",
"product": {
"name": "bpftool-0:4.18.0-372.126.1.el8_6.x86_64",
"product_id": "bpftool-0:4.18.0-372.126.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-372.126.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-372.126.1.el8_6.x86_64",
"product": {
"name": "kernel-0:4.18.0-372.126.1.el8_6.x86_64",
"product_id": "kernel-0:4.18.0-372.126.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-372.126.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-372.126.1.el8_6.x86_64",
"product": {
"name": "kernel-core-0:4.18.0-372.126.1.el8_6.x86_64",
"product_id": "kernel-core-0:4.18.0-372.126.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-372.126.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"product_id": "kernel-cross-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-372.126.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-372.126.1.el8_6.x86_64",
"product": {
"name": "kernel-debug-0:4.18.0-372.126.1.el8_6.x86_64",
"product_id": "kernel-debug-0:4.18.0-372.126.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-372.126.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-372.126.1.el8_6.x86_64",
"product": {
"name": "kernel-debug-core-0:4.18.0-372.126.1.el8_6.x86_64",
"product_id": "kernel-debug-core-0:4.18.0-372.126.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-372.126.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"product_id": "kernel-debug-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-372.126.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"product_id": "kernel-debug-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-372.126.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-372.126.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"product": {
"name": "kernel-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"product_id": "kernel-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-372.126.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"product": {
"name": "kernel-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"product_id": "kernel-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-372.126.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"product": {
"name": "kernel-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"product_id": "kernel-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-372.126.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"product_id": "kernel-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-372.126.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-372.126.1.el8_6.x86_64",
"product": {
"name": "kernel-tools-0:4.18.0-372.126.1.el8_6.x86_64",
"product_id": "kernel-tools-0:4.18.0-372.126.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-372.126.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-372.126.1.el8_6.x86_64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-372.126.1.el8_6.x86_64",
"product_id": "kernel-tools-libs-0:4.18.0-372.126.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-372.126.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-372.126.1.el8_6.x86_64",
"product": {
"name": "perf-0:4.18.0-372.126.1.el8_6.x86_64",
"product_id": "perf-0:4.18.0-372.126.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-372.126.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-372.126.1.el8_6.x86_64",
"product": {
"name": "python3-perf-0:4.18.0-372.126.1.el8_6.x86_64",
"product_id": "python3-perf-0:4.18.0-372.126.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-372.126.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"product_id": "bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-372.126.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-372.126.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"product_id": "kernel-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-372.126.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-372.126.1.el8_6.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-372.126.1.el8_6.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-372.126.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-372.126.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-372.126.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"product": {
"name": "perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"product_id": "perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-372.126.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"product_id": "python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-372.126.1.el8_6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:4.18.0-372.126.1.el8_6.src",
"product": {
"name": "kernel-0:4.18.0-372.126.1.el8_6.src",
"product_id": "kernel-0:4.18.0-372.126.1.el8_6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-372.126.1.el8_6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-stablelists-0:4.18.0-372.126.1.el8_6.noarch",
"product": {
"name": "kernel-abi-stablelists-0:4.18.0-372.126.1.el8_6.noarch",
"product_id": "kernel-abi-stablelists-0:4.18.0-372.126.1.el8_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-stablelists@4.18.0-372.126.1.el8_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:4.18.0-372.126.1.el8_6.noarch",
"product": {
"name": "kernel-doc-0:4.18.0-372.126.1.el8_6.noarch",
"product_id": "kernel-doc-0:4.18.0-372.126.1.el8_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@4.18.0-372.126.1.el8_6?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-372.126.1.el8_6.aarch64",
"product": {
"name": "bpftool-0:4.18.0-372.126.1.el8_6.aarch64",
"product_id": "bpftool-0:4.18.0-372.126.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-372.126.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-372.126.1.el8_6.aarch64",
"product": {
"name": "kernel-0:4.18.0-372.126.1.el8_6.aarch64",
"product_id": "kernel-0:4.18.0-372.126.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-372.126.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-372.126.1.el8_6.aarch64",
"product": {
"name": "kernel-core-0:4.18.0-372.126.1.el8_6.aarch64",
"product_id": "kernel-core-0:4.18.0-372.126.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-372.126.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-372.126.1.el8_6.aarch64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-372.126.1.el8_6.aarch64",
"product_id": "kernel-cross-headers-0:4.18.0-372.126.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-372.126.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-372.126.1.el8_6.aarch64",
"product": {
"name": "kernel-debug-0:4.18.0-372.126.1.el8_6.aarch64",
"product_id": "kernel-debug-0:4.18.0-372.126.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-372.126.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-372.126.1.el8_6.aarch64",
"product": {
"name": "kernel-debug-core-0:4.18.0-372.126.1.el8_6.aarch64",
"product_id": "kernel-debug-core-0:4.18.0-372.126.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-372.126.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-372.126.1.el8_6.aarch64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-372.126.1.el8_6.aarch64",
"product_id": "kernel-debug-devel-0:4.18.0-372.126.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-372.126.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-372.126.1.el8_6.aarch64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-372.126.1.el8_6.aarch64",
"product_id": "kernel-debug-modules-0:4.18.0-372.126.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-372.126.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.aarch64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.aarch64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-372.126.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-372.126.1.el8_6.aarch64",
"product": {
"name": "kernel-devel-0:4.18.0-372.126.1.el8_6.aarch64",
"product_id": "kernel-devel-0:4.18.0-372.126.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-372.126.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-372.126.1.el8_6.aarch64",
"product": {
"name": "kernel-headers-0:4.18.0-372.126.1.el8_6.aarch64",
"product_id": "kernel-headers-0:4.18.0-372.126.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-372.126.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-372.126.1.el8_6.aarch64",
"product": {
"name": "kernel-modules-0:4.18.0-372.126.1.el8_6.aarch64",
"product_id": "kernel-modules-0:4.18.0-372.126.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-372.126.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-372.126.1.el8_6.aarch64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-372.126.1.el8_6.aarch64",
"product_id": "kernel-modules-extra-0:4.18.0-372.126.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-372.126.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-372.126.1.el8_6.aarch64",
"product": {
"name": "kernel-tools-0:4.18.0-372.126.1.el8_6.aarch64",
"product_id": "kernel-tools-0:4.18.0-372.126.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-372.126.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-372.126.1.el8_6.aarch64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-372.126.1.el8_6.aarch64",
"product_id": "kernel-tools-libs-0:4.18.0-372.126.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-372.126.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-372.126.1.el8_6.aarch64",
"product": {
"name": "perf-0:4.18.0-372.126.1.el8_6.aarch64",
"product_id": "perf-0:4.18.0-372.126.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-372.126.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-372.126.1.el8_6.aarch64",
"product": {
"name": "python3-perf-0:4.18.0-372.126.1.el8_6.aarch64",
"product_id": "python3-perf-0:4.18.0-372.126.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-372.126.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"product_id": "bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-372.126.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-372.126.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"product_id": "kernel-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-372.126.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-372.126.1.el8_6.aarch64",
"product": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-372.126.1.el8_6.aarch64",
"product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-372.126.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-372.126.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-372.126.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"product": {
"name": "perf-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"product_id": "perf-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-372.126.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"product_id": "python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-372.126.1.el8_6?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-372.126.1.el8_6.ppc64le",
"product": {
"name": "bpftool-0:4.18.0-372.126.1.el8_6.ppc64le",
"product_id": "bpftool-0:4.18.0-372.126.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-372.126.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-372.126.1.el8_6.ppc64le",
"product": {
"name": "kernel-0:4.18.0-372.126.1.el8_6.ppc64le",
"product_id": "kernel-0:4.18.0-372.126.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-372.126.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-372.126.1.el8_6.ppc64le",
"product": {
"name": "kernel-core-0:4.18.0-372.126.1.el8_6.ppc64le",
"product_id": "kernel-core-0:4.18.0-372.126.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-372.126.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-372.126.1.el8_6.ppc64le",
"product": {
"name": "kernel-cross-headers-0:4.18.0-372.126.1.el8_6.ppc64le",
"product_id": "kernel-cross-headers-0:4.18.0-372.126.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-372.126.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-372.126.1.el8_6.ppc64le",
"product": {
"name": "kernel-debug-0:4.18.0-372.126.1.el8_6.ppc64le",
"product_id": "kernel-debug-0:4.18.0-372.126.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-372.126.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-372.126.1.el8_6.ppc64le",
"product": {
"name": "kernel-debug-core-0:4.18.0-372.126.1.el8_6.ppc64le",
"product_id": "kernel-debug-core-0:4.18.0-372.126.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-372.126.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-372.126.1.el8_6.ppc64le",
"product": {
"name": "kernel-debug-devel-0:4.18.0-372.126.1.el8_6.ppc64le",
"product_id": "kernel-debug-devel-0:4.18.0-372.126.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-372.126.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-372.126.1.el8_6.ppc64le",
"product": {
"name": "kernel-debug-modules-0:4.18.0-372.126.1.el8_6.ppc64le",
"product_id": "kernel-debug-modules-0:4.18.0-372.126.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-372.126.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.ppc64le",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.ppc64le",
"product_id": "kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-372.126.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-372.126.1.el8_6.ppc64le",
"product": {
"name": "kernel-devel-0:4.18.0-372.126.1.el8_6.ppc64le",
"product_id": "kernel-devel-0:4.18.0-372.126.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-372.126.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-372.126.1.el8_6.ppc64le",
"product": {
"name": "kernel-headers-0:4.18.0-372.126.1.el8_6.ppc64le",
"product_id": "kernel-headers-0:4.18.0-372.126.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-372.126.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-372.126.1.el8_6.ppc64le",
"product": {
"name": "kernel-modules-0:4.18.0-372.126.1.el8_6.ppc64le",
"product_id": "kernel-modules-0:4.18.0-372.126.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-372.126.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-372.126.1.el8_6.ppc64le",
"product": {
"name": "kernel-modules-extra-0:4.18.0-372.126.1.el8_6.ppc64le",
"product_id": "kernel-modules-extra-0:4.18.0-372.126.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-372.126.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-372.126.1.el8_6.ppc64le",
"product": {
"name": "kernel-tools-0:4.18.0-372.126.1.el8_6.ppc64le",
"product_id": "kernel-tools-0:4.18.0-372.126.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-372.126.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-372.126.1.el8_6.ppc64le",
"product": {
"name": "kernel-tools-libs-0:4.18.0-372.126.1.el8_6.ppc64le",
"product_id": "kernel-tools-libs-0:4.18.0-372.126.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-372.126.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-372.126.1.el8_6.ppc64le",
"product": {
"name": "perf-0:4.18.0-372.126.1.el8_6.ppc64le",
"product_id": "perf-0:4.18.0-372.126.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-372.126.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-372.126.1.el8_6.ppc64le",
"product": {
"name": "python3-perf-0:4.18.0-372.126.1.el8_6.ppc64le",
"product_id": "python3-perf-0:4.18.0-372.126.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-372.126.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"product_id": "bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-372.126.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"product_id": "kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-372.126.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"product": {
"name": "kernel-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"product_id": "kernel-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-372.126.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.126.1.el8_6.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.126.1.el8_6.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.126.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-372.126.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"product_id": "kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-372.126.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"product": {
"name": "perf-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"product_id": "perf-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-372.126.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"product_id": "python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-372.126.1.el8_6?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-372.126.1.el8_6.s390x",
"product": {
"name": "bpftool-0:4.18.0-372.126.1.el8_6.s390x",
"product_id": "bpftool-0:4.18.0-372.126.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-372.126.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-372.126.1.el8_6.s390x",
"product": {
"name": "kernel-0:4.18.0-372.126.1.el8_6.s390x",
"product_id": "kernel-0:4.18.0-372.126.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-372.126.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-372.126.1.el8_6.s390x",
"product": {
"name": "kernel-core-0:4.18.0-372.126.1.el8_6.s390x",
"product_id": "kernel-core-0:4.18.0-372.126.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-372.126.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-372.126.1.el8_6.s390x",
"product": {
"name": "kernel-cross-headers-0:4.18.0-372.126.1.el8_6.s390x",
"product_id": "kernel-cross-headers-0:4.18.0-372.126.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-372.126.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-372.126.1.el8_6.s390x",
"product": {
"name": "kernel-debug-0:4.18.0-372.126.1.el8_6.s390x",
"product_id": "kernel-debug-0:4.18.0-372.126.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-372.126.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-372.126.1.el8_6.s390x",
"product": {
"name": "kernel-debug-core-0:4.18.0-372.126.1.el8_6.s390x",
"product_id": "kernel-debug-core-0:4.18.0-372.126.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-372.126.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-372.126.1.el8_6.s390x",
"product": {
"name": "kernel-debug-devel-0:4.18.0-372.126.1.el8_6.s390x",
"product_id": "kernel-debug-devel-0:4.18.0-372.126.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-372.126.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-372.126.1.el8_6.s390x",
"product": {
"name": "kernel-debug-modules-0:4.18.0-372.126.1.el8_6.s390x",
"product_id": "kernel-debug-modules-0:4.18.0-372.126.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-372.126.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.s390x",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.s390x",
"product_id": "kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-372.126.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-372.126.1.el8_6.s390x",
"product": {
"name": "kernel-devel-0:4.18.0-372.126.1.el8_6.s390x",
"product_id": "kernel-devel-0:4.18.0-372.126.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-372.126.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-372.126.1.el8_6.s390x",
"product": {
"name": "kernel-headers-0:4.18.0-372.126.1.el8_6.s390x",
"product_id": "kernel-headers-0:4.18.0-372.126.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-372.126.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-372.126.1.el8_6.s390x",
"product": {
"name": "kernel-modules-0:4.18.0-372.126.1.el8_6.s390x",
"product_id": "kernel-modules-0:4.18.0-372.126.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-372.126.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-372.126.1.el8_6.s390x",
"product": {
"name": "kernel-modules-extra-0:4.18.0-372.126.1.el8_6.s390x",
"product_id": "kernel-modules-extra-0:4.18.0-372.126.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-372.126.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-372.126.1.el8_6.s390x",
"product": {
"name": "kernel-tools-0:4.18.0-372.126.1.el8_6.s390x",
"product_id": "kernel-tools-0:4.18.0-372.126.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-372.126.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-0:4.18.0-372.126.1.el8_6.s390x",
"product": {
"name": "kernel-zfcpdump-0:4.18.0-372.126.1.el8_6.s390x",
"product_id": "kernel-zfcpdump-0:4.18.0-372.126.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-372.126.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-core-0:4.18.0-372.126.1.el8_6.s390x",
"product": {
"name": "kernel-zfcpdump-core-0:4.18.0-372.126.1.el8_6.s390x",
"product_id": "kernel-zfcpdump-core-0:4.18.0-372.126.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-372.126.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-0:4.18.0-372.126.1.el8_6.s390x",
"product": {
"name": "kernel-zfcpdump-devel-0:4.18.0-372.126.1.el8_6.s390x",
"product_id": "kernel-zfcpdump-devel-0:4.18.0-372.126.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-372.126.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-0:4.18.0-372.126.1.el8_6.s390x",
"product": {
"name": "kernel-zfcpdump-modules-0:4.18.0-372.126.1.el8_6.s390x",
"product_id": "kernel-zfcpdump-modules-0:4.18.0-372.126.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-372.126.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-372.126.1.el8_6.s390x",
"product": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-372.126.1.el8_6.s390x",
"product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-372.126.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-372.126.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-372.126.1.el8_6.s390x",
"product": {
"name": "perf-0:4.18.0-372.126.1.el8_6.s390x",
"product_id": "perf-0:4.18.0-372.126.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-372.126.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-372.126.1.el8_6.s390x",
"product": {
"name": "python3-perf-0:4.18.0-372.126.1.el8_6.s390x",
"product_id": "python3-perf-0:4.18.0-372.126.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-372.126.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"product_id": "bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-372.126.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"product_id": "kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-372.126.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"product": {
"name": "kernel-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"product_id": "kernel-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-372.126.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:4.18.0-372.126.1.el8_6.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-372.126.1.el8_6.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:4.18.0-372.126.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-372.126.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"product_id": "kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-372.126.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"product": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-372.126.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"product": {
"name": "perf-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"product_id": "perf-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-372.126.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"product_id": "python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-372.126.1.el8_6?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:bpftool-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "bpftool-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.126.1.el8_6.src as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.126.1.el8_6.src"
},
"product_reference": "kernel-0:4.18.0-372.126.1.el8_6.src",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "kernel-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:4.18.0-372.126.1.el8_6.noarch as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:kernel-abi-stablelists-0:4.18.0-372.126.1.el8_6.noarch"
},
"product_reference": "kernel-abi-stablelists-0:4.18.0-372.126.1.el8_6.noarch",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:kernel-core-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:kernel-debug-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:kernel-debug-core-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:kernel-devel-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-372.126.1.el8_6.noarch as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:kernel-doc-0:4.18.0-372.126.1.el8_6.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-372.126.1.el8_6.noarch",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:kernel-headers-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:kernel-modules-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:kernel-tools-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:perf-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "perf-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:python3-perf-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.126.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.aarch64"
},
"product_reference": "bpftool-0:4.18.0-372.126.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.126.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-372.126.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.126.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.s390x"
},
"product_reference": "bpftool-0:4.18.0-372.126.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "bpftool-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.126.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.aarch64"
},
"product_reference": "kernel-0:4.18.0-372.126.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.126.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.ppc64le"
},
"product_reference": "kernel-0:4.18.0-372.126.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.126.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.s390x"
},
"product_reference": "kernel-0:4.18.0-372.126.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.126.1.el8_6.src as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.src"
},
"product_reference": "kernel-0:4.18.0-372.126.1.el8_6.src",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "kernel-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:4.18.0-372.126.1.el8_6.noarch as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-abi-stablelists-0:4.18.0-372.126.1.el8_6.noarch"
},
"product_reference": "kernel-abi-stablelists-0:4.18.0-372.126.1.el8_6.noarch",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.126.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-372.126.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.126.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-372.126.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.126.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.s390x"
},
"product_reference": "kernel-core-0:4.18.0-372.126.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.126.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.126.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.126.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.126.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.126.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.126.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.126.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-372.126.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.126.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-372.126.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.126.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-372.126.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.126.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.126.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.126.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.126.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.126.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.126.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.126.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.126.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.126.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.126.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.126.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.126.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.126.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.126.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.126.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.126.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.126.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.126.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.126.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-372.126.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-aarch64-0:4.18.0-372.126.1.el8_6.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-372.126.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.126.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-372.126.1.el8_6.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.126.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-372.126.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-s390x-0:4.18.0-372.126.1.el8_6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-372.126.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.126.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-372.126.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.126.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-372.126.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.126.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-372.126.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-372.126.1.el8_6.noarch as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-doc-0:4.18.0-372.126.1.el8_6.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-372.126.1.el8_6.noarch",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.126.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-372.126.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.126.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-372.126.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.126.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-372.126.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.126.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-372.126.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.126.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-372.126.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.126.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-372.126.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.126.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.126.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.126.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.126.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.126.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.126.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.126.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-372.126.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.126.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-372.126.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.126.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-372.126.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-372.126.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-372.126.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-372.126.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-372.126.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-372.126.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-0:4.18.0-372.126.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-372.126.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-372.126.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-core-0:4.18.0-372.126.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-372.126.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-372.126.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-debuginfo-0:4.18.0-372.126.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-372.126.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-devel-0:4.18.0-372.126.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-372.126.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-372.126.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-0:4.18.0-372.126.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-372.126.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-372.126.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-extra-0:4.18.0-372.126.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-372.126.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.126.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.aarch64"
},
"product_reference": "perf-0:4.18.0-372.126.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.126.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.ppc64le"
},
"product_reference": "perf-0:4.18.0-372.126.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.126.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.s390x"
},
"product_reference": "perf-0:4.18.0-372.126.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "perf-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.126.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.126.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-372.126.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.126.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-372.126.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.126.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.s390x"
},
"product_reference": "python3-perf-0:4.18.0-372.126.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:bpftool-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "bpftool-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.126.1.el8_6.src as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.126.1.el8_6.src"
},
"product_reference": "kernel-0:4.18.0-372.126.1.el8_6.src",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "kernel-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:4.18.0-372.126.1.el8_6.noarch as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:kernel-abi-stablelists-0:4.18.0-372.126.1.el8_6.noarch"
},
"product_reference": "kernel-abi-stablelists-0:4.18.0-372.126.1.el8_6.noarch",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:kernel-core-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:kernel-debug-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:kernel-debug-core-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:kernel-devel-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-372.126.1.el8_6.noarch as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:kernel-doc-0:4.18.0-372.126.1.el8_6.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-372.126.1.el8_6.noarch",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:kernel-headers-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:kernel-modules-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:kernel-tools-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:perf-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "perf-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:python3-perf-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-47560",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2024-05-24T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.Z.AUS:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-headers-0:4.18.0-372.126.1.el8_6.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2283389"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the Linux kernel\u0027s mlxsw spectrum driver, where processing port up/down events leads to a NULL pointer dereference. This issue occurs when the driver fails to handle events for the CPU port, which exists but lacks a corresponding network device, resulting in system crashes.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: mlxsw: spectrum: Protect driver from buggy firmware",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.Z.AUS:bpftool-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.126.1.el8_6.src",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-abi-stablelists-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-doc-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.src",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-abi-stablelists-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-aarch64-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-s390x-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-doc-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-core-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-devel-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-extra-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.126.1.el8_6.src",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-abi-stablelists-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-doc-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.Z.AUS:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-headers-0:4.18.0-372.126.1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47560"
},
{
"category": "external",
"summary": "RHBZ#2283389",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2283389"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47560",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47560"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47560",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47560"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052451-CVE-2021-47560-4a52@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052451-CVE-2021-47560-4a52@gregkh/T"
}
],
"release_date": "2024-05-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-10-16T00:36:58+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.Z.AUS:bpftool-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.126.1.el8_6.src",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-abi-stablelists-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-doc-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.src",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-abi-stablelists-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-aarch64-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-s390x-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-doc-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-core-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-devel-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-extra-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.126.1.el8_6.src",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-abi-stablelists-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-doc-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8161"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.6.0.Z.AUS:bpftool-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.126.1.el8_6.src",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-abi-stablelists-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-doc-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.src",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-abi-stablelists-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-aarch64-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-s390x-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-doc-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-core-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-devel-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-extra-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.126.1.el8_6.src",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-abi-stablelists-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-doc-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.Z.AUS:bpftool-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.126.1.el8_6.src",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-abi-stablelists-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-doc-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.src",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-abi-stablelists-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-aarch64-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-s390x-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-doc-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-core-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-devel-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-extra-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.126.1.el8_6.src",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-abi-stablelists-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-doc-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: mlxsw: spectrum: Protect driver from buggy firmware"
},
{
"cve": "CVE-2024-26598",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2024-02-24T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.Z.AUS:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-headers-0:4.18.0-372.126.1.el8_6.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2265801"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel pertaining to a potential use-after-free (UAF) scenario in a system involving Logical Partitioning Interrupts (LPI) translation cache operations. Specifically, the issue arises when a cache hit occurs concurrently with an operation that invalidates the cache, such as a DISCARD ITS command. The root cause is traced to vgic_its_check_cache() not appropriately managing the reference count of the vgic_irq object. Upon returning from this function, the reference count of vgic_irq is not incremented. This issue can lead to the object being prematurely freed while still in use by other parts of the system, potentially resulting in undefined behavior or system instability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: kvm: Avoid potential UAF in LPI translation cache",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The vulnerability is assessed as having a Moderate severity due to its potential to cause system instability or undefined behavior under specific conditions. Specifically, the issue arises from concurrent operations involving the LPI translation cache and commands that invalidate this cache, such as DISCARD ITS commands. The root cause lies in vgic_its_check_cache() failing to increment the reference count of the vgic_irq object before releasing the lock. This oversight can lead to a use-after-free scenario where the object may be prematurely freed while still in use elsewhere in the system. As a consequence, if the object is accessed or modified after being freed, it can result in unpredictable behavior, crashes, or even security vulnerabilities if an attacker can control the timing of cache invalidation and subsequent accesses.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.Z.AUS:bpftool-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.126.1.el8_6.src",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-abi-stablelists-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-doc-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.src",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-abi-stablelists-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-aarch64-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-s390x-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-doc-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-core-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-devel-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-extra-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.126.1.el8_6.src",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-abi-stablelists-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-doc-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.Z.AUS:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-headers-0:4.18.0-372.126.1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-26598"
},
{
"category": "external",
"summary": "RHBZ#2265801",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265801"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-26598",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26598"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-26598",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26598"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024022338-CVE-2024-26598-24f4@gregkh/T/#u",
"url": "https://lore.kernel.org/linux-cve-announce/2024022338-CVE-2024-26598-24f4@gregkh/T/#u"
}
],
"release_date": "2024-02-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-10-16T00:36:58+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.Z.AUS:bpftool-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.126.1.el8_6.src",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-abi-stablelists-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-doc-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.src",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-abi-stablelists-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-aarch64-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-s390x-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-doc-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-core-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-devel-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-extra-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.126.1.el8_6.src",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-abi-stablelists-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-doc-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8161"
},
{
"category": "workaround",
"details": "No mitigation is currently available for this vulnerability. Make sure to perform the updates as they become available.",
"product_ids": [
"BaseOS-8.6.0.Z.AUS:bpftool-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.126.1.el8_6.src",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-abi-stablelists-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-doc-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.src",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-abi-stablelists-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-aarch64-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-s390x-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-doc-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-core-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-devel-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-extra-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.126.1.el8_6.src",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-abi-stablelists-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-doc-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.Z.AUS:bpftool-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.126.1.el8_6.src",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-abi-stablelists-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-doc-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.src",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-abi-stablelists-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-aarch64-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-s390x-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-doc-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-core-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-devel-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-extra-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.126.1.el8_6.src",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-abi-stablelists-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-doc-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: kvm: Avoid potential UAF in LPI translation cache"
},
{
"cve": "CVE-2024-26830",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2024-04-17T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.Z.AUS:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-headers-0:4.18.0-372.126.1.el8_6.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2275596"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Intel network adapters in the Linux kernel, where untrusted virtualized network interfaces can remove MAC addresses set by the system. This flaw allows an attacker with sufficient privileges to cause a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: i40e: Do not allow untrusted VF to remove administratively set MAC",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.Z.AUS:bpftool-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.126.1.el8_6.src",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-abi-stablelists-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-doc-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.src",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-abi-stablelists-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-aarch64-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-s390x-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-doc-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-core-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-devel-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-extra-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.126.1.el8_6.src",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-abi-stablelists-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-doc-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.Z.AUS:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-headers-0:4.18.0-372.126.1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-26830"
},
{
"category": "external",
"summary": "RHBZ#2275596",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2275596"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-26830",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26830"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-26830",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26830"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024041703-CVE-2024-26830-5bc0@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024041703-CVE-2024-26830-5bc0@gregkh/T"
}
],
"release_date": "2024-04-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-10-16T00:36:58+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.Z.AUS:bpftool-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.126.1.el8_6.src",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-abi-stablelists-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-doc-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.src",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-abi-stablelists-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-aarch64-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-s390x-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-doc-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-core-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-devel-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-extra-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.126.1.el8_6.src",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-abi-stablelists-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-doc-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8161"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.Z.AUS:bpftool-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.126.1.el8_6.src",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-abi-stablelists-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-doc-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.src",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-abi-stablelists-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-aarch64-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-s390x-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-doc-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-core-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-devel-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-extra-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.126.1.el8_6.src",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-abi-stablelists-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-doc-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: i40e: Do not allow untrusted VF to remove administratively set MAC"
},
{
"cve": "CVE-2024-35884",
"discovery_date": "2024-05-19T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.Z.AUS:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-headers-0:4.18.0-372.126.1.el8_6.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2281704"
}
],
"notes": [
{
"category": "description",
"text": "CVE-2024-35884 highlights a flaw in the Linux kernel\u0027s handling of UDP packets when Generic Receive Offload (GRO) forwarding is enabled. The issue occurs because non-tunnel UDP packets are sometimes mistakenly processed as if they belong to a tunnel. This can lead to data corruption or kernel crashes, particularly in environments with complex network configurations or when certain tunneling protocols like Geneve are used.\n\nThe kernel\u0027s processing logic for GRO and UDP packets fails to properly differentiate between tunneled and non-tunneled packets. As a result, improperly handled packets may lead to segmentation errors or system instability.\n\nThis vulnerability affects system availability and could result in crashes or data integrity issues during packet forwarding.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: udp: do not accept non-tunnel GSO skbs landing in a tunnel",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.Z.AUS:bpftool-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.126.1.el8_6.src",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-abi-stablelists-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-doc-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.src",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-abi-stablelists-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-aarch64-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-s390x-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-doc-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-core-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-devel-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-extra-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.126.1.el8_6.src",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-abi-stablelists-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-doc-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.Z.AUS:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-headers-0:4.18.0-372.126.1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-35884"
},
{
"category": "external",
"summary": "RHBZ#2281704",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2281704"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-35884",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35884"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-35884",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-35884"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024051946-CVE-2024-35884-d4a4@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024051946-CVE-2024-35884-d4a4@gregkh/T"
}
],
"release_date": "2024-05-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-10-16T00:36:58+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.Z.AUS:bpftool-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.126.1.el8_6.src",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-abi-stablelists-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-doc-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.src",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-abi-stablelists-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-aarch64-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-s390x-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-doc-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-core-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-devel-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-extra-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.126.1.el8_6.src",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-abi-stablelists-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-doc-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8161"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.Z.AUS:bpftool-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.126.1.el8_6.src",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-abi-stablelists-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-doc-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.src",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-abi-stablelists-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-aarch64-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-s390x-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-doc-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-core-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-devel-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-extra-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.126.1.el8_6.src",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-abi-stablelists-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-doc-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: udp: do not accept non-tunnel GSO skbs landing in a tunnel"
}
]
}
RHSA-2024_3855
Vulnerability from csaf_redhat - Published: 2024-06-12 02:00 - Updated: 2024-12-11 16:41Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 9.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: KVM: SVM: improper check in svm_set_x2apic_msr_interception allows direct access to host x2apic msrs (CVE-2023-5090)\n\n* kernel: bluetooth: bt_sock_ioctl race condition leads to use-after-free in bt_sock_recvmsg (CVE-2023-51779)\n\n* kernel: kvm: Avoid potential UAF in LPI translation cache (CVE-2024-26598)\n\n* kernel: KVM: s390: vsie: fix race during shadow creation (CVE-2023-52639)\n\n* kernel: net/mlx5e: fix a potential double-free in fs_any_create_groups (CVE-2023-52667)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:3855",
"url": "https://access.redhat.com/errata/RHSA-2024:3855"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2248122",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2248122"
},
{
"category": "external",
"summary": "2256822",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256822"
},
{
"category": "external",
"summary": "2265801",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265801"
},
{
"category": "external",
"summary": "2273080",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2273080"
},
{
"category": "external",
"summary": "2281350",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2281350"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_3855.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2024-12-11T16:41:16+00:00",
"generator": {
"date": "2024-12-11T16:41:16+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.3"
}
},
"id": "RHSA-2024:3855",
"initial_release_date": "2024-06-12T02:00:48+00:00",
"revision_history": [
{
"date": "2024-06-12T02:00:48+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-06-12T02:00:48+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-11T16:41:16+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:9.2::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:9.2::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product": {
"name": "Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:9.2::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"product": {
"name": "kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"product_id": "kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@5.14.0-284.69.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"product": {
"name": "kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"product_id": "kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@5.14.0-284.69.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"product": {
"name": "bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"product_id": "bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@7.0.0-284.69.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"product": {
"name": "kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"product_id": "kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-64k-debug-debuginfo@5.14.0-284.69.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"product": {
"name": "kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"product_id": "kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-64k-debuginfo@5.14.0-284.69.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"product": {
"name": "kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"product_id": "kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@5.14.0-284.69.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"product": {
"name": "kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"product_id": "kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@5.14.0-284.69.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"product": {
"name": "kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"product_id": "kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@5.14.0-284.69.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"product": {
"name": "kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"product_id": "kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@5.14.0-284.69.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"product": {
"name": "perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"product_id": "perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@5.14.0-284.69.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"product": {
"name": "python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"product_id": "python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@5.14.0-284.69.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"product": {
"name": "kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"product_id": "kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-64k-debug-devel@5.14.0-284.69.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"product": {
"name": "kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"product_id": "kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-64k-debug-devel-matched@5.14.0-284.69.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"product": {
"name": "kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"product_id": "kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-64k-devel@5.14.0-284.69.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"product": {
"name": "kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"product_id": "kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-64k-devel-matched@5.14.0-284.69.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"product": {
"name": "kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"product_id": "kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@5.14.0-284.69.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"product": {
"name": "kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"product_id": "kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel-matched@5.14.0-284.69.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"product": {
"name": "kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"product_id": "kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@5.14.0-284.69.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"product": {
"name": "kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"product_id": "kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel-matched@5.14.0-284.69.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"product": {
"name": "kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"product_id": "kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@5.14.0-284.69.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-0:5.14.0-284.69.1.el9_2.aarch64",
"product": {
"name": "perf-0:5.14.0-284.69.1.el9_2.aarch64",
"product_id": "perf-0:5.14.0-284.69.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@5.14.0-284.69.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"product": {
"name": "rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"product_id": "rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rtla@5.14.0-284.69.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"product": {
"name": "bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"product_id": "bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@7.0.0-284.69.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"product": {
"name": "kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"product_id": "kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@5.14.0-284.69.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"product": {
"name": "kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"product_id": "kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-64k@5.14.0-284.69.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"product": {
"name": "kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"product_id": "kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-64k-core@5.14.0-284.69.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"product": {
"name": "kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"product_id": "kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-64k-debug@5.14.0-284.69.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"product": {
"name": "kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"product_id": "kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-64k-debug-core@5.14.0-284.69.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"product": {
"name": "kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"product_id": "kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-64k-debug-modules@5.14.0-284.69.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"product": {
"name": "kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"product_id": "kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-64k-debug-modules-core@5.14.0-284.69.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"product": {
"name": "kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"product_id": "kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-64k-debug-modules-extra@5.14.0-284.69.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"product": {
"name": "kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"product_id": "kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-64k-modules@5.14.0-284.69.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"product": {
"name": "kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"product_id": "kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-64k-modules-core@5.14.0-284.69.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"product": {
"name": "kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"product_id": "kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-64k-modules-extra@5.14.0-284.69.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"product": {
"name": "kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"product_id": "kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@5.14.0-284.69.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"product": {
"name": "kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"product_id": "kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@5.14.0-284.69.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"product": {
"name": "kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"product_id": "kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@5.14.0-284.69.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"product": {
"name": "kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"product_id": "kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@5.14.0-284.69.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"product": {
"name": "kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"product_id": "kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-core@5.14.0-284.69.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"product": {
"name": "kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"product_id": "kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@5.14.0-284.69.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"product": {
"name": "kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"product_id": "kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@5.14.0-284.69.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"product": {
"name": "kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"product_id": "kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-core@5.14.0-284.69.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"product": {
"name": "kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"product_id": "kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@5.14.0-284.69.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"product": {
"name": "kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"product_id": "kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@5.14.0-284.69.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"product": {
"name": "kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"product_id": "kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@5.14.0-284.69.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"product": {
"name": "python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"product_id": "python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@5.14.0-284.69.1.el9_2?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"product": {
"name": "kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"product_id": "kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@5.14.0-284.69.1.el9_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"product_id": "kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@5.14.0-284.69.1.el9_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"product_id": "bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@7.0.0-284.69.1.el9_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"product_id": "kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@5.14.0-284.69.1.el9_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"product": {
"name": "kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"product_id": "kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@5.14.0-284.69.1.el9_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@5.14.0-284.69.1.el9_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"product_id": "kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@5.14.0-284.69.1.el9_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"product": {
"name": "perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"product_id": "perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@5.14.0-284.69.1.el9_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"product": {
"name": "python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"product_id": "python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@5.14.0-284.69.1.el9_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"product": {
"name": "kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"product_id": "kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@5.14.0-284.69.1.el9_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"product": {
"name": "kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"product_id": "kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel-matched@5.14.0-284.69.1.el9_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"product": {
"name": "kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"product_id": "kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@5.14.0-284.69.1.el9_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"product": {
"name": "kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"product_id": "kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel-matched@5.14.0-284.69.1.el9_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"product": {
"name": "kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"product_id": "kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@5.14.0-284.69.1.el9_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"product": {
"name": "perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"product_id": "perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@5.14.0-284.69.1.el9_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"product": {
"name": "rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"product_id": "rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rtla@5.14.0-284.69.1.el9_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"product": {
"name": "bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"product_id": "bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@7.0.0-284.69.1.el9_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"product": {
"name": "kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"product_id": "kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@5.14.0-284.69.1.el9_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"product": {
"name": "kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"product_id": "kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@5.14.0-284.69.1.el9_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"product": {
"name": "kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"product_id": "kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@5.14.0-284.69.1.el9_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"product": {
"name": "kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"product_id": "kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@5.14.0-284.69.1.el9_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"product": {
"name": "kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"product_id": "kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@5.14.0-284.69.1.el9_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"product": {
"name": "kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"product_id": "kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-core@5.14.0-284.69.1.el9_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"product": {
"name": "kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"product_id": "kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@5.14.0-284.69.1.el9_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"product": {
"name": "kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"product_id": "kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@5.14.0-284.69.1.el9_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"product": {
"name": "kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"product_id": "kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-core@5.14.0-284.69.1.el9_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"product": {
"name": "kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"product_id": "kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@5.14.0-284.69.1.el9_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"product": {
"name": "kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"product_id": "kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@5.14.0-284.69.1.el9_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"product": {
"name": "kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"product_id": "kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@5.14.0-284.69.1.el9_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"product": {
"name": "python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"product_id": "python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@5.14.0-284.69.1.el9_2?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"product": {
"name": "kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"product_id": "kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@5.14.0-284.69.1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"product_id": "kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@5.14.0-284.69.1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"product": {
"name": "bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"product_id": "bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@7.0.0-284.69.1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"product_id": "kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@5.14.0-284.69.1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"product": {
"name": "kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"product_id": "kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@5.14.0-284.69.1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@5.14.0-284.69.1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"product_id": "kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@5.14.0-284.69.1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"product": {
"name": "perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"product_id": "perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@5.14.0-284.69.1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"product_id": "python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@5.14.0-284.69.1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"product": {
"name": "kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"product_id": "kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@5.14.0-284.69.1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"product": {
"name": "kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"product_id": "kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel-matched@5.14.0-284.69.1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"product": {
"name": "kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"product_id": "kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@5.14.0-284.69.1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"product": {
"name": "kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"product_id": "kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel-matched@5.14.0-284.69.1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"product": {
"name": "kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"product_id": "kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@5.14.0-284.69.1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:5.14.0-284.69.1.el9_2.x86_64",
"product": {
"name": "perf-0:5.14.0-284.69.1.el9_2.x86_64",
"product_id": "perf-0:5.14.0-284.69.1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@5.14.0-284.69.1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rtla-0:5.14.0-284.69.1.el9_2.x86_64",
"product": {
"name": "rtla-0:5.14.0-284.69.1.el9_2.x86_64",
"product_id": "rtla-0:5.14.0-284.69.1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rtla@5.14.0-284.69.1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"product": {
"name": "bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"product_id": "bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@7.0.0-284.69.1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"product": {
"name": "kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"product_id": "kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@5.14.0-284.69.1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"product": {
"name": "kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"product_id": "kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@5.14.0-284.69.1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"product": {
"name": "kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"product_id": "kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@5.14.0-284.69.1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"product": {
"name": "kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"product_id": "kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@5.14.0-284.69.1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"product": {
"name": "kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"product_id": "kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@5.14.0-284.69.1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"product": {
"name": "kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"product_id": "kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-core@5.14.0-284.69.1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"product": {
"name": "kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"product_id": "kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@5.14.0-284.69.1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"product": {
"name": "kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"product_id": "kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-uki-virt@5.14.0-284.69.1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"product": {
"name": "kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"product_id": "kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@5.14.0-284.69.1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"product": {
"name": "kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"product_id": "kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-core@5.14.0-284.69.1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"product": {
"name": "kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"product_id": "kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@5.14.0-284.69.1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"product": {
"name": "kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"product_id": "kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@5.14.0-284.69.1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"product": {
"name": "kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"product_id": "kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@5.14.0-284.69.1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"product": {
"name": "kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"product_id": "kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-uki-virt@5.14.0-284.69.1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"product": {
"name": "python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"product_id": "python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@5.14.0-284.69.1.el9_2?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"product": {
"name": "kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"product_id": "kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@5.14.0-284.69.1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"product": {
"name": "bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"product_id": "bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@7.0.0-284.69.1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"product_id": "kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@5.14.0-284.69.1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"product": {
"name": "kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"product_id": "kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@5.14.0-284.69.1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@5.14.0-284.69.1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"product": {
"name": "kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"product_id": "kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@5.14.0-284.69.1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"product": {
"name": "kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"product_id": "kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@5.14.0-284.69.1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"product": {
"name": "perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"product_id": "perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@5.14.0-284.69.1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"product": {
"name": "python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"product_id": "python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@5.14.0-284.69.1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"product": {
"name": "kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"product_id": "kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@5.14.0-284.69.1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"product": {
"name": "kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"product_id": "kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel-matched@5.14.0-284.69.1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"product": {
"name": "kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"product_id": "kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@5.14.0-284.69.1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"product": {
"name": "kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"product_id": "kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel-matched@5.14.0-284.69.1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"product": {
"name": "kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"product_id": "kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@5.14.0-284.69.1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"product": {
"name": "kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"product_id": "kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@5.14.0-284.69.1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"product": {
"name": "kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"product_id": "kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel-matched@5.14.0-284.69.1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:5.14.0-284.69.1.el9_2.s390x",
"product": {
"name": "perf-0:5.14.0-284.69.1.el9_2.s390x",
"product_id": "perf-0:5.14.0-284.69.1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@5.14.0-284.69.1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rtla-0:5.14.0-284.69.1.el9_2.s390x",
"product": {
"name": "rtla-0:5.14.0-284.69.1.el9_2.s390x",
"product_id": "rtla-0:5.14.0-284.69.1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rtla@5.14.0-284.69.1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"product": {
"name": "bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"product_id": "bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@7.0.0-284.69.1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:5.14.0-284.69.1.el9_2.s390x",
"product": {
"name": "kernel-0:5.14.0-284.69.1.el9_2.s390x",
"product_id": "kernel-0:5.14.0-284.69.1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@5.14.0-284.69.1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"product": {
"name": "kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"product_id": "kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@5.14.0-284.69.1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"product": {
"name": "kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"product_id": "kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@5.14.0-284.69.1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"product": {
"name": "kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"product_id": "kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@5.14.0-284.69.1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"product": {
"name": "kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"product_id": "kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@5.14.0-284.69.1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"product": {
"name": "kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"product_id": "kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-core@5.14.0-284.69.1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"product": {
"name": "kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"product_id": "kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@5.14.0-284.69.1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"product": {
"name": "kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"product_id": "kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@5.14.0-284.69.1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"product": {
"name": "kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"product_id": "kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-core@5.14.0-284.69.1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"product": {
"name": "kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"product_id": "kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@5.14.0-284.69.1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"product": {
"name": "kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"product_id": "kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@5.14.0-284.69.1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"product": {
"name": "kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"product_id": "kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump@5.14.0-284.69.1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"product": {
"name": "kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"product_id": "kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-core@5.14.0-284.69.1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"product": {
"name": "kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"product_id": "kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@5.14.0-284.69.1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"product": {
"name": "kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"product_id": "kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-core@5.14.0-284.69.1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"product": {
"name": "kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"product_id": "kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@5.14.0-284.69.1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"product": {
"name": "python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"product_id": "python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@5.14.0-284.69.1.el9_2?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"product": {
"name": "kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"product_id": "kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@5.14.0-284.69.1.el9_2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"product": {
"name": "kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"product_id": "kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-stablelists@5.14.0-284.69.1.el9_2?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:5.14.0-284.69.1.el9_2.src",
"product": {
"name": "kernel-0:5.14.0-284.69.1.el9_2.src",
"product_id": "kernel-0:5.14.0-284.69.1.el9_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@5.14.0-284.69.1.el9_2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:7.0.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64"
},
"product_reference": "bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:7.0.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:7.0.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x"
},
"product_reference": "bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:7.0.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64"
},
"product_reference": "bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64"
},
"product_reference": "bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x"
},
"product_reference": "bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64"
},
"product_reference": "bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-284.69.1.el9_2.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src"
},
"product_reference": "kernel-0:5.14.0-284.69.1.el9_2.src",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch"
},
"product_reference": "kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:5.14.0-284.69.1.el9_2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch"
},
"product_reference": "kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "perf-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "perf-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "perf-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rtla-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rtla-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rtla-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "rtla-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rtla-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "rtla-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:7.0.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64"
},
"product_reference": "bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:7.0.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:7.0.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x"
},
"product_reference": "bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:7.0.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64"
},
"product_reference": "bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64"
},
"product_reference": "bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x"
},
"product_reference": "bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64"
},
"product_reference": "bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-284.69.1.el9_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src"
},
"product_reference": "kernel-0:5.14.0-284.69.1.el9_2.src",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch"
},
"product_reference": "kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:5.14.0-284.69.1.el9_2.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch"
},
"product_reference": "kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "perf-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "perf-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "perf-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rtla-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rtla-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rtla-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "rtla-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rtla-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "rtla-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:7.0.0-284.69.1.el9_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64"
},
"product_reference": "bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:7.0.0-284.69.1.el9_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:7.0.0-284.69.1.el9_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x"
},
"product_reference": "bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:7.0.0-284.69.1.el9_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64"
},
"product_reference": "bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64"
},
"product_reference": "bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x"
},
"product_reference": "bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64"
},
"product_reference": "bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-284.69.1.el9_2.src as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src"
},
"product_reference": "kernel-0:5.14.0-284.69.1.el9_2.src",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch"
},
"product_reference": "kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:5.14.0-284.69.1.el9_2.noarch as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch"
},
"product_reference": "kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "perf-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "perf-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "perf-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rtla-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rtla-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rtla-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "rtla-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rtla-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "rtla-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Maxim Levitsky"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2023-5090",
"cwe": {
"id": "CWE-755",
"name": "Improper Handling of Exceptional Conditions"
},
"discovery_date": "2023-09-20T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2248122"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in KVM. An improper check in svm_set_x2apic_msr_interception() may allow direct access to host x2apic msrs when the guest resets its apic, potentially leading to a denial of service condition.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: KVM: SVM: improper check in svm_set_x2apic_msr_interception allows direct access to host x2apic msrs",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 6 and 7 are not affected by this CVE as they did not include support for (de)activating x2AVIC mode, introduced upstream in kernel v6.0 with commit 4d1d794.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64"
],
"known_not_affected": [
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-5090"
},
{
"category": "external",
"summary": "RHBZ#2248122",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2248122"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-5090",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5090"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-5090",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-5090"
}
],
"release_date": "2023-09-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-06-12T02:00:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:3855"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.0,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: KVM: SVM: improper check in svm_set_x2apic_msr_interception allows direct access to host x2apic msrs"
},
{
"cve": "CVE-2023-51779",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2024-01-04T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256822"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Bluetooth subsystem of the Linux kernel. A race condition between the bt_sock_recvmsg() and bt_sock_ioctl() functions could lead to a use-after-free on a socket buffer (\"skb\"). This flaw allows a local user to cause a denial of service condition or potential code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: bluetooth: bt_sock_ioctl race condition leads to use-after-free in bt_sock_recvmsg",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw has been rated as having a Moderate impact because it is believed to be difficult to exploit and it is not clear whether or not it could be used to achieve local privilege escalation.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64"
],
"known_not_affected": [
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-51779"
},
{
"category": "external",
"summary": "RHBZ#2256822",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256822"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-51779",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51779"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-51779",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-51779"
},
{
"category": "external",
"summary": "https://github.com/torvalds/linux/commit/2e07e8348ea454615e268222ae3fc240421be768",
"url": "https://github.com/torvalds/linux/commit/2e07e8348ea454615e268222ae3fc240421be768"
}
],
"release_date": "2023-12-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-06-12T02:00:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:3855"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: bluetooth: bt_sock_ioctl race condition leads to use-after-free in bt_sock_recvmsg"
},
{
"cve": "CVE-2023-52639",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2024-04-03T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2273080"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: s390: vsie: fix race during shadow creation\n\nRight now it is possible to see gmap-\u003eprivate being zero in\nkvm_s390_vsie_gmap_notifier resulting in a crash. This is due to the\nfact that we add gmap-\u003eprivate == kvm after creation:\n\nstatic int acquire_gmap_shadow(struct kvm_vcpu *vcpu,\n struct vsie_page *vsie_page)\n{\n[...]\n gmap = gmap_shadow(vcpu-\u003earch.gmap, asce, edat);\n if (IS_ERR(gmap))\n return PTR_ERR(gmap);\n gmap-\u003eprivate = vcpu-\u003ekvm;\n\nLet children inherit the private field of the parent.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: KVM: s390: vsie: fix race during shadow creation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64"
],
"known_not_affected": [
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-52639"
},
{
"category": "external",
"summary": "RHBZ#2273080",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2273080"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-52639",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52639"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-52639",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-52639"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024040335-CVE-2023-52639-5b67@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024040335-CVE-2023-52639-5b67@gregkh/T"
}
],
"release_date": "2024-04-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-06-12T02:00:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:3855"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: KVM: s390: vsie: fix race during shadow creation"
},
{
"cve": "CVE-2023-52667",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"discovery_date": "2024-05-17T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2281350"
}
],
"notes": [
{
"category": "description",
"text": "A double-free flaw was found in the Linux kernel ConnectX-4 and Connect-IB cards in the Mellanox driver. This issue could allow a local user to crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: net/mlx5e: fix a potential double-free in fs_any_create_groups",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 8 and 9 versions are affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64"
],
"known_not_affected": [
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-52667"
},
{
"category": "external",
"summary": "RHBZ#2281350",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2281350"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-52667",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52667"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-52667",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-52667"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024051728-CVE-2023-52667-649b@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024051728-CVE-2023-52667-649b@gregkh/T"
}
],
"release_date": "2024-05-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-06-12T02:00:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:3855"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent module mlx5_core from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: net/mlx5e: fix a potential double-free in fs_any_create_groups"
},
{
"cve": "CVE-2024-26598",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2024-02-24T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2265801"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel pertaining to a potential use-after-free (UAF) scenario in a system involving Logical Partitioning Interrupts (LPI) translation cache operations. Specifically, the issue arises when a cache hit occurs concurrently with an operation that invalidates the cache, such as a DISCARD ITS command. The root cause is traced to vgic_its_check_cache() not appropriately managing the reference count of the vgic_irq object. Upon returning from this function, the reference count of vgic_irq is not incremented. This issue can lead to the object being prematurely freed while still in use by other parts of the system, potentially resulting in undefined behavior or system instability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: kvm: Avoid potential UAF in LPI translation cache",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The vulnerability is assessed as having a Moderate severity due to its potential to cause system instability or undefined behavior under specific conditions. Specifically, the issue arises from concurrent operations involving the LPI translation cache and commands that invalidate this cache, such as DISCARD ITS commands. The root cause lies in vgic_its_check_cache() failing to increment the reference count of the vgic_irq object before releasing the lock. This oversight can lead to a use-after-free scenario where the object may be prematurely freed while still in use elsewhere in the system. As a consequence, if the object is accessed or modified after being freed, it can result in unpredictable behavior, crashes, or even security vulnerabilities if an attacker can control the timing of cache invalidation and subsequent accesses.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64"
],
"known_not_affected": [
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-26598"
},
{
"category": "external",
"summary": "RHBZ#2265801",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265801"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-26598",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26598"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-26598",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26598"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024022338-CVE-2024-26598-24f4@gregkh/T/#u",
"url": "https://lore.kernel.org/linux-cve-announce/2024022338-CVE-2024-26598-24f4@gregkh/T/#u"
}
],
"release_date": "2024-02-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-06-12T02:00:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:3855"
},
{
"category": "workaround",
"details": "No mitigation is currently available for this vulnerability. Make sure to perform the updates as they become available.",
"product_ids": [
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: kvm: Avoid potential UAF in LPI translation cache"
}
]
}
RHSA-2024:4415
Vulnerability from csaf_redhat - Published: 2024-07-09 09:24 - Updated: 2025-11-21 19:05Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: netfilter: use-after-free in nft_trans_gc_catchall_sync leads to privilege escalation (CVE-2024-0193)\n\n* kernel: smb: client: fix potential OOBs in smb2_parse_contexts() (CVE-2023-52434)\n\n* kernel: kvm: Avoid potential UAF in LPI translation cache (CVE-2024-26598)\n\n* kernel: netfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations (CVE-2024-26673)\n\nBug Fix(es):\n\n* multi-page bvec configuration for integrity payload (JIRA:RHEL-15150)\n\n* ipoib mcast lockup fix (JIRA:RHEL-30259)\n\n* Kernel panic in skb_segment (JIRA:RHEL-30560)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:4415",
"url": "https://access.redhat.com/errata/RHSA-2024:4415"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2255653",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255653"
},
{
"category": "external",
"summary": "2265285",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265285"
},
{
"category": "external",
"summary": "2265801",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265801"
},
{
"category": "external",
"summary": "2272816",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272816"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_4415.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2025-11-21T19:05:42+00:00",
"generator": {
"date": "2025-11-21T19:05:42+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2024:4415",
"initial_release_date": "2024-07-09T09:24:52+00:00",
"revision_history": [
{
"date": "2024-07-09T09:24:52+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-07-09T09:24:52+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T19:05:42+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product": {
"name": "Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_e4s:9.0::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:9.0::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:5.14.0-70.105.1.el9_0.aarch64",
"product": {
"name": "bpftool-0:5.14.0-70.105.1.el9_0.aarch64",
"product_id": "bpftool-0:5.14.0-70.105.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@5.14.0-70.105.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:5.14.0-70.105.1.el9_0.aarch64",
"product": {
"name": "kernel-0:5.14.0-70.105.1.el9_0.aarch64",
"product_id": "kernel-0:5.14.0-70.105.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@5.14.0-70.105.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:5.14.0-70.105.1.el9_0.aarch64",
"product": {
"name": "kernel-core-0:5.14.0-70.105.1.el9_0.aarch64",
"product_id": "kernel-core-0:5.14.0-70.105.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@5.14.0-70.105.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:5.14.0-70.105.1.el9_0.aarch64",
"product": {
"name": "kernel-debug-0:5.14.0-70.105.1.el9_0.aarch64",
"product_id": "kernel-debug-0:5.14.0-70.105.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@5.14.0-70.105.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:5.14.0-70.105.1.el9_0.aarch64",
"product": {
"name": "kernel-debug-core-0:5.14.0-70.105.1.el9_0.aarch64",
"product_id": "kernel-debug-core-0:5.14.0-70.105.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@5.14.0-70.105.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"product": {
"name": "kernel-debug-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"product_id": "kernel-debug-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@5.14.0-70.105.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"product": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"product_id": "kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@5.14.0-70.105.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"product": {
"name": "kernel-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"product_id": "kernel-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@5.14.0-70.105.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"product": {
"name": "kernel-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"product_id": "kernel-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@5.14.0-70.105.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:5.14.0-70.105.1.el9_0.aarch64",
"product": {
"name": "kernel-tools-0:5.14.0-70.105.1.el9_0.aarch64",
"product_id": "kernel-tools-0:5.14.0-70.105.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@5.14.0-70.105.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:5.14.0-70.105.1.el9_0.aarch64",
"product": {
"name": "kernel-tools-libs-0:5.14.0-70.105.1.el9_0.aarch64",
"product_id": "kernel-tools-libs-0:5.14.0-70.105.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@5.14.0-70.105.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:5.14.0-70.105.1.el9_0.aarch64",
"product": {
"name": "python3-perf-0:5.14.0-70.105.1.el9_0.aarch64",
"product_id": "python3-perf-0:5.14.0-70.105.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@5.14.0-70.105.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"product": {
"name": "bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"product_id": "bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@5.14.0-70.105.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"product": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"product_id": "kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@5.14.0-70.105.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"product": {
"name": "kernel-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"product_id": "kernel-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@5.14.0-70.105.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-aarch64-0:5.14.0-70.105.1.el9_0.aarch64",
"product": {
"name": "kernel-debuginfo-common-aarch64-0:5.14.0-70.105.1.el9_0.aarch64",
"product_id": "kernel-debuginfo-common-aarch64-0:5.14.0-70.105.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@5.14.0-70.105.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"product": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"product_id": "kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@5.14.0-70.105.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"product": {
"name": "perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"product_id": "perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@5.14.0-70.105.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"product": {
"name": "python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"product_id": "python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@5.14.0-70.105.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"product": {
"name": "kernel-debug-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"product_id": "kernel-debug-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@5.14.0-70.105.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"product": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"product_id": "kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel-matched@5.14.0-70.105.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"product": {
"name": "kernel-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"product_id": "kernel-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@5.14.0-70.105.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"product": {
"name": "kernel-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"product_id": "kernel-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel-matched@5.14.0-70.105.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:5.14.0-70.105.1.el9_0.aarch64",
"product": {
"name": "kernel-headers-0:5.14.0-70.105.1.el9_0.aarch64",
"product_id": "kernel-headers-0:5.14.0-70.105.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@5.14.0-70.105.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-0:5.14.0-70.105.1.el9_0.aarch64",
"product": {
"name": "perf-0:5.14.0-70.105.1.el9_0.aarch64",
"product_id": "perf-0:5.14.0-70.105.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@5.14.0-70.105.1.el9_0?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:5.14.0-70.105.1.el9_0.ppc64le",
"product": {
"name": "bpftool-0:5.14.0-70.105.1.el9_0.ppc64le",
"product_id": "bpftool-0:5.14.0-70.105.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@5.14.0-70.105.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:5.14.0-70.105.1.el9_0.ppc64le",
"product": {
"name": "kernel-0:5.14.0-70.105.1.el9_0.ppc64le",
"product_id": "kernel-0:5.14.0-70.105.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@5.14.0-70.105.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"product": {
"name": "kernel-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"product_id": "kernel-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@5.14.0-70.105.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:5.14.0-70.105.1.el9_0.ppc64le",
"product": {
"name": "kernel-debug-0:5.14.0-70.105.1.el9_0.ppc64le",
"product_id": "kernel-debug-0:5.14.0-70.105.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@5.14.0-70.105.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"product": {
"name": "kernel-debug-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"product_id": "kernel-debug-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@5.14.0-70.105.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"product": {
"name": "kernel-debug-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"product_id": "kernel-debug-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@5.14.0-70.105.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"product": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"product_id": "kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@5.14.0-70.105.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"product": {
"name": "kernel-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"product_id": "kernel-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@5.14.0-70.105.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"product": {
"name": "kernel-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"product_id": "kernel-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@5.14.0-70.105.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:5.14.0-70.105.1.el9_0.ppc64le",
"product": {
"name": "kernel-tools-0:5.14.0-70.105.1.el9_0.ppc64le",
"product_id": "kernel-tools-0:5.14.0-70.105.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@5.14.0-70.105.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:5.14.0-70.105.1.el9_0.ppc64le",
"product": {
"name": "kernel-tools-libs-0:5.14.0-70.105.1.el9_0.ppc64le",
"product_id": "kernel-tools-libs-0:5.14.0-70.105.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@5.14.0-70.105.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"product": {
"name": "python3-perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"product_id": "python3-perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@5.14.0-70.105.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"product_id": "bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@5.14.0-70.105.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"product_id": "kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@5.14.0-70.105.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"product": {
"name": "kernel-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"product_id": "kernel-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@5.14.0-70.105.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:5.14.0-70.105.1.el9_0.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:5.14.0-70.105.1.el9_0.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:5.14.0-70.105.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@5.14.0-70.105.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"product_id": "kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@5.14.0-70.105.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"product": {
"name": "perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"product_id": "perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@5.14.0-70.105.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"product": {
"name": "python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"product_id": "python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@5.14.0-70.105.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"product": {
"name": "kernel-debug-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"product_id": "kernel-debug-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@5.14.0-70.105.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"product": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"product_id": "kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel-matched@5.14.0-70.105.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"product": {
"name": "kernel-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"product_id": "kernel-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@5.14.0-70.105.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"product": {
"name": "kernel-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"product_id": "kernel-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel-matched@5.14.0-70.105.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:5.14.0-70.105.1.el9_0.ppc64le",
"product": {
"name": "kernel-headers-0:5.14.0-70.105.1.el9_0.ppc64le",
"product_id": "kernel-headers-0:5.14.0-70.105.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@5.14.0-70.105.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"product": {
"name": "perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"product_id": "perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@5.14.0-70.105.1.el9_0?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:5.14.0-70.105.1.el9_0.x86_64",
"product": {
"name": "bpftool-0:5.14.0-70.105.1.el9_0.x86_64",
"product_id": "bpftool-0:5.14.0-70.105.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@5.14.0-70.105.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:5.14.0-70.105.1.el9_0.x86_64",
"product": {
"name": "kernel-0:5.14.0-70.105.1.el9_0.x86_64",
"product_id": "kernel-0:5.14.0-70.105.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@5.14.0-70.105.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:5.14.0-70.105.1.el9_0.x86_64",
"product": {
"name": "kernel-core-0:5.14.0-70.105.1.el9_0.x86_64",
"product_id": "kernel-core-0:5.14.0-70.105.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@5.14.0-70.105.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:5.14.0-70.105.1.el9_0.x86_64",
"product": {
"name": "kernel-debug-0:5.14.0-70.105.1.el9_0.x86_64",
"product_id": "kernel-debug-0:5.14.0-70.105.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@5.14.0-70.105.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:5.14.0-70.105.1.el9_0.x86_64",
"product": {
"name": "kernel-debug-core-0:5.14.0-70.105.1.el9_0.x86_64",
"product_id": "kernel-debug-core-0:5.14.0-70.105.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@5.14.0-70.105.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"product": {
"name": "kernel-debug-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"product_id": "kernel-debug-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@5.14.0-70.105.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"product": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"product_id": "kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@5.14.0-70.105.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"product": {
"name": "kernel-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"product_id": "kernel-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@5.14.0-70.105.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"product": {
"name": "kernel-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"product_id": "kernel-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@5.14.0-70.105.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:5.14.0-70.105.1.el9_0.x86_64",
"product": {
"name": "kernel-tools-0:5.14.0-70.105.1.el9_0.x86_64",
"product_id": "kernel-tools-0:5.14.0-70.105.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@5.14.0-70.105.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:5.14.0-70.105.1.el9_0.x86_64",
"product": {
"name": "kernel-tools-libs-0:5.14.0-70.105.1.el9_0.x86_64",
"product_id": "kernel-tools-libs-0:5.14.0-70.105.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@5.14.0-70.105.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:5.14.0-70.105.1.el9_0.x86_64",
"product": {
"name": "python3-perf-0:5.14.0-70.105.1.el9_0.x86_64",
"product_id": "python3-perf-0:5.14.0-70.105.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@5.14.0-70.105.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"product": {
"name": "bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"product_id": "bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@5.14.0-70.105.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"product_id": "kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@5.14.0-70.105.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"product": {
"name": "kernel-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"product_id": "kernel-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@5.14.0-70.105.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:5.14.0-70.105.1.el9_0.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:5.14.0-70.105.1.el9_0.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:5.14.0-70.105.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@5.14.0-70.105.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"product_id": "kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@5.14.0-70.105.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"product": {
"name": "perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"product_id": "perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@5.14.0-70.105.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"product_id": "python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@5.14.0-70.105.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"product": {
"name": "kernel-debug-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"product_id": "kernel-debug-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@5.14.0-70.105.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"product": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"product_id": "kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel-matched@5.14.0-70.105.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"product": {
"name": "kernel-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"product_id": "kernel-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@5.14.0-70.105.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"product": {
"name": "kernel-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"product_id": "kernel-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel-matched@5.14.0-70.105.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:5.14.0-70.105.1.el9_0.x86_64",
"product": {
"name": "kernel-headers-0:5.14.0-70.105.1.el9_0.x86_64",
"product_id": "kernel-headers-0:5.14.0-70.105.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@5.14.0-70.105.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:5.14.0-70.105.1.el9_0.x86_64",
"product": {
"name": "perf-0:5.14.0-70.105.1.el9_0.x86_64",
"product_id": "perf-0:5.14.0-70.105.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@5.14.0-70.105.1.el9_0?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:5.14.0-70.105.1.el9_0.s390x",
"product": {
"name": "bpftool-0:5.14.0-70.105.1.el9_0.s390x",
"product_id": "bpftool-0:5.14.0-70.105.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@5.14.0-70.105.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:5.14.0-70.105.1.el9_0.s390x",
"product": {
"name": "kernel-0:5.14.0-70.105.1.el9_0.s390x",
"product_id": "kernel-0:5.14.0-70.105.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@5.14.0-70.105.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:5.14.0-70.105.1.el9_0.s390x",
"product": {
"name": "kernel-core-0:5.14.0-70.105.1.el9_0.s390x",
"product_id": "kernel-core-0:5.14.0-70.105.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@5.14.0-70.105.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:5.14.0-70.105.1.el9_0.s390x",
"product": {
"name": "kernel-debug-0:5.14.0-70.105.1.el9_0.s390x",
"product_id": "kernel-debug-0:5.14.0-70.105.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@5.14.0-70.105.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:5.14.0-70.105.1.el9_0.s390x",
"product": {
"name": "kernel-debug-core-0:5.14.0-70.105.1.el9_0.s390x",
"product_id": "kernel-debug-core-0:5.14.0-70.105.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@5.14.0-70.105.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:5.14.0-70.105.1.el9_0.s390x",
"product": {
"name": "kernel-debug-modules-0:5.14.0-70.105.1.el9_0.s390x",
"product_id": "kernel-debug-modules-0:5.14.0-70.105.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@5.14.0-70.105.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"product": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"product_id": "kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@5.14.0-70.105.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:5.14.0-70.105.1.el9_0.s390x",
"product": {
"name": "kernel-modules-0:5.14.0-70.105.1.el9_0.s390x",
"product_id": "kernel-modules-0:5.14.0-70.105.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@5.14.0-70.105.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"product": {
"name": "kernel-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"product_id": "kernel-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@5.14.0-70.105.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:5.14.0-70.105.1.el9_0.s390x",
"product": {
"name": "kernel-tools-0:5.14.0-70.105.1.el9_0.s390x",
"product_id": "kernel-tools-0:5.14.0-70.105.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@5.14.0-70.105.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-0:5.14.0-70.105.1.el9_0.s390x",
"product": {
"name": "kernel-zfcpdump-0:5.14.0-70.105.1.el9_0.s390x",
"product_id": "kernel-zfcpdump-0:5.14.0-70.105.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump@5.14.0-70.105.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-core-0:5.14.0-70.105.1.el9_0.s390x",
"product": {
"name": "kernel-zfcpdump-core-0:5.14.0-70.105.1.el9_0.s390x",
"product_id": "kernel-zfcpdump-core-0:5.14.0-70.105.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-core@5.14.0-70.105.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-0:5.14.0-70.105.1.el9_0.s390x",
"product": {
"name": "kernel-zfcpdump-modules-0:5.14.0-70.105.1.el9_0.s390x",
"product_id": "kernel-zfcpdump-modules-0:5.14.0-70.105.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@5.14.0-70.105.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"product": {
"name": "kernel-zfcpdump-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"product_id": "kernel-zfcpdump-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@5.14.0-70.105.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:5.14.0-70.105.1.el9_0.s390x",
"product": {
"name": "python3-perf-0:5.14.0-70.105.1.el9_0.s390x",
"product_id": "python3-perf-0:5.14.0-70.105.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@5.14.0-70.105.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"product": {
"name": "bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"product_id": "bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@5.14.0-70.105.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"product_id": "kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@5.14.0-70.105.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"product": {
"name": "kernel-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"product_id": "kernel-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@5.14.0-70.105.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:5.14.0-70.105.1.el9_0.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:5.14.0-70.105.1.el9_0.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:5.14.0-70.105.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@5.14.0-70.105.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"product": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"product_id": "kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@5.14.0-70.105.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"product": {
"name": "kernel-zfcpdump-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"product_id": "kernel-zfcpdump-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@5.14.0-70.105.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"product": {
"name": "perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"product_id": "perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@5.14.0-70.105.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"product": {
"name": "python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"product_id": "python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@5.14.0-70.105.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:5.14.0-70.105.1.el9_0.s390x",
"product": {
"name": "kernel-debug-devel-0:5.14.0-70.105.1.el9_0.s390x",
"product_id": "kernel-debug-devel-0:5.14.0-70.105.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@5.14.0-70.105.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"product": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"product_id": "kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel-matched@5.14.0-70.105.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:5.14.0-70.105.1.el9_0.s390x",
"product": {
"name": "kernel-devel-0:5.14.0-70.105.1.el9_0.s390x",
"product_id": "kernel-devel-0:5.14.0-70.105.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@5.14.0-70.105.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"product": {
"name": "kernel-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"product_id": "kernel-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel-matched@5.14.0-70.105.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:5.14.0-70.105.1.el9_0.s390x",
"product": {
"name": "kernel-headers-0:5.14.0-70.105.1.el9_0.s390x",
"product_id": "kernel-headers-0:5.14.0-70.105.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@5.14.0-70.105.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-0:5.14.0-70.105.1.el9_0.s390x",
"product": {
"name": "kernel-zfcpdump-devel-0:5.14.0-70.105.1.el9_0.s390x",
"product_id": "kernel-zfcpdump-devel-0:5.14.0-70.105.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@5.14.0-70.105.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"product": {
"name": "kernel-zfcpdump-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"product_id": "kernel-zfcpdump-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel-matched@5.14.0-70.105.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:5.14.0-70.105.1.el9_0.s390x",
"product": {
"name": "perf-0:5.14.0-70.105.1.el9_0.s390x",
"product_id": "perf-0:5.14.0-70.105.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@5.14.0-70.105.1.el9_0?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:5.14.0-70.105.1.el9_0.src",
"product": {
"name": "kernel-0:5.14.0-70.105.1.el9_0.src",
"product_id": "kernel-0:5.14.0-70.105.1.el9_0.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@5.14.0-70.105.1.el9_0?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-stablelists-0:5.14.0-70.105.1.el9_0.noarch",
"product": {
"name": "kernel-abi-stablelists-0:5.14.0-70.105.1.el9_0.noarch",
"product_id": "kernel-abi-stablelists-0:5.14.0-70.105.1.el9_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-stablelists@5.14.0-70.105.1.el9_0?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:5.14.0-70.105.1.el9_0.noarch",
"product": {
"name": "kernel-doc-0:5.14.0-70.105.1.el9_0.noarch",
"product_id": "kernel-doc-0:5.14.0-70.105.1.el9_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@5.14.0-70.105.1.el9_0?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-70.105.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.aarch64"
},
"product_reference": "bpftool-0:5.14.0-70.105.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-70.105.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.ppc64le"
},
"product_reference": "bpftool-0:5.14.0-70.105.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "bpftool-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-70.105.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.x86_64"
},
"product_reference": "bpftool-0:5.14.0-70.105.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-70.105.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.aarch64"
},
"product_reference": "kernel-0:5.14.0-70.105.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-70.105.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.ppc64le"
},
"product_reference": "kernel-0:5.14.0-70.105.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "kernel-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-70.105.1.el9_0.src as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.src"
},
"product_reference": "kernel-0:5.14.0-70.105.1.el9_0.src",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-70.105.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.x86_64"
},
"product_reference": "kernel-0:5.14.0-70.105.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:5.14.0-70.105.1.el9_0.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-abi-stablelists-0:5.14.0-70.105.1.el9_0.noarch"
},
"product_reference": "kernel-abi-stablelists-0:5.14.0-70.105.1.el9_0.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-70.105.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.aarch64"
},
"product_reference": "kernel-core-0:5.14.0-70.105.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-70.105.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.ppc64le"
},
"product_reference": "kernel-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "kernel-core-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-70.105.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.x86_64"
},
"product_reference": "kernel-core-0:5.14.0-70.105.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-70.105.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-0:5.14.0-70.105.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-70.105.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-0:5.14.0-70.105.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "kernel-debug-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-70.105.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-0:5.14.0-70.105.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-70.105.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-core-0:5.14.0-70.105.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-70.105.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "kernel-debug-core-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-70.105.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-core-0:5.14.0-70.105.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-70.105.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-70.105.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "kernel-debug-devel-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-70.105.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-70.105.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-70.105.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "kernel-debug-modules-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-70.105.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64"
},
"product_reference": "kernel-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le"
},
"product_reference": "kernel-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "kernel-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64"
},
"product_reference": "kernel-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:5.14.0-70.105.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-aarch64-0:5.14.0-70.105.1.el9_0.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:5.14.0-70.105.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:5.14.0-70.105.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:5.14.0-70.105.1.el9_0.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:5.14.0-70.105.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-s390x-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:5.14.0-70.105.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:5.14.0-70.105.1.el9_0.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:5.14.0-70.105.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-70.105.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.aarch64"
},
"product_reference": "kernel-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-70.105.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.ppc64le"
},
"product_reference": "kernel-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "kernel-devel-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-70.105.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.x86_64"
},
"product_reference": "kernel-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64"
},
"product_reference": "kernel-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le"
},
"product_reference": "kernel-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "kernel-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64"
},
"product_reference": "kernel-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:5.14.0-70.105.1.el9_0.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-doc-0:5.14.0-70.105.1.el9_0.noarch"
},
"product_reference": "kernel-doc-0:5.14.0-70.105.1.el9_0.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-70.105.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.aarch64"
},
"product_reference": "kernel-headers-0:5.14.0-70.105.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-70.105.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.ppc64le"
},
"product_reference": "kernel-headers-0:5.14.0-70.105.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "kernel-headers-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-70.105.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.x86_64"
},
"product_reference": "kernel-headers-0:5.14.0-70.105.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-70.105.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.aarch64"
},
"product_reference": "kernel-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-70.105.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.ppc64le"
},
"product_reference": "kernel-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "kernel-modules-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-70.105.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.x86_64"
},
"product_reference": "kernel-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64"
},
"product_reference": "kernel-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le"
},
"product_reference": "kernel-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "kernel-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64"
},
"product_reference": "kernel-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-70.105.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.aarch64"
},
"product_reference": "kernel-tools-0:5.14.0-70.105.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-70.105.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.ppc64le"
},
"product_reference": "kernel-tools-0:5.14.0-70.105.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "kernel-tools-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-70.105.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.x86_64"
},
"product_reference": "kernel-tools-0:5.14.0-70.105.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-70.105.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.aarch64"
},
"product_reference": "kernel-tools-libs-0:5.14.0-70.105.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-70.105.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.ppc64le"
},
"product_reference": "kernel-tools-libs-0:5.14.0-70.105.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-70.105.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.x86_64"
},
"product_reference": "kernel-tools-libs-0:5.14.0-70.105.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-zfcpdump-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-zfcpdump-core-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-zfcpdump-debuginfo-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-zfcpdump-devel-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-matched-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-zfcpdump-devel-matched-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-zfcpdump-modules-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-zfcpdump-modules-extra-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-70.105.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.aarch64"
},
"product_reference": "perf-0:5.14.0-70.105.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-70.105.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.ppc64le"
},
"product_reference": "perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "perf-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-70.105.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.x86_64"
},
"product_reference": "perf-0:5.14.0-70.105.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64"
},
"product_reference": "perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le"
},
"product_reference": "perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64"
},
"product_reference": "perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-70.105.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.aarch64"
},
"product_reference": "python3-perf-0:5.14.0-70.105.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-70.105.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.ppc64le"
},
"product_reference": "python3-perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "python3-perf-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-70.105.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.x86_64"
},
"product_reference": "python3-perf-0:5.14.0-70.105.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-70.105.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.aarch64"
},
"product_reference": "bpftool-0:5.14.0-70.105.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-70.105.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.ppc64le"
},
"product_reference": "bpftool-0:5.14.0-70.105.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "bpftool-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-70.105.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.x86_64"
},
"product_reference": "bpftool-0:5.14.0-70.105.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-70.105.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.aarch64"
},
"product_reference": "kernel-0:5.14.0-70.105.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-70.105.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.ppc64le"
},
"product_reference": "kernel-0:5.14.0-70.105.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "kernel-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-70.105.1.el9_0.src as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.src"
},
"product_reference": "kernel-0:5.14.0-70.105.1.el9_0.src",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-70.105.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.x86_64"
},
"product_reference": "kernel-0:5.14.0-70.105.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:5.14.0-70.105.1.el9_0.noarch as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-abi-stablelists-0:5.14.0-70.105.1.el9_0.noarch"
},
"product_reference": "kernel-abi-stablelists-0:5.14.0-70.105.1.el9_0.noarch",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-70.105.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.aarch64"
},
"product_reference": "kernel-core-0:5.14.0-70.105.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-70.105.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.ppc64le"
},
"product_reference": "kernel-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "kernel-core-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-70.105.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.x86_64"
},
"product_reference": "kernel-core-0:5.14.0-70.105.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-70.105.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-0:5.14.0-70.105.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-70.105.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-0:5.14.0-70.105.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "kernel-debug-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-70.105.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-0:5.14.0-70.105.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-70.105.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-core-0:5.14.0-70.105.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-70.105.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "kernel-debug-core-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-70.105.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-core-0:5.14.0-70.105.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-70.105.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-70.105.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "kernel-debug-devel-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-70.105.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-70.105.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-70.105.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "kernel-debug-modules-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-70.105.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64"
},
"product_reference": "kernel-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le"
},
"product_reference": "kernel-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "kernel-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64"
},
"product_reference": "kernel-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:5.14.0-70.105.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-aarch64-0:5.14.0-70.105.1.el9_0.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:5.14.0-70.105.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:5.14.0-70.105.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:5.14.0-70.105.1.el9_0.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:5.14.0-70.105.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-s390x-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:5.14.0-70.105.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:5.14.0-70.105.1.el9_0.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:5.14.0-70.105.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-70.105.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.aarch64"
},
"product_reference": "kernel-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-70.105.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.ppc64le"
},
"product_reference": "kernel-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "kernel-devel-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-70.105.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.x86_64"
},
"product_reference": "kernel-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64"
},
"product_reference": "kernel-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le"
},
"product_reference": "kernel-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "kernel-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64"
},
"product_reference": "kernel-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:5.14.0-70.105.1.el9_0.noarch as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-doc-0:5.14.0-70.105.1.el9_0.noarch"
},
"product_reference": "kernel-doc-0:5.14.0-70.105.1.el9_0.noarch",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-70.105.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.aarch64"
},
"product_reference": "kernel-headers-0:5.14.0-70.105.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-70.105.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.ppc64le"
},
"product_reference": "kernel-headers-0:5.14.0-70.105.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "kernel-headers-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-70.105.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.x86_64"
},
"product_reference": "kernel-headers-0:5.14.0-70.105.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-70.105.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.aarch64"
},
"product_reference": "kernel-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-70.105.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.ppc64le"
},
"product_reference": "kernel-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "kernel-modules-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-70.105.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.x86_64"
},
"product_reference": "kernel-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64"
},
"product_reference": "kernel-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le"
},
"product_reference": "kernel-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "kernel-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64"
},
"product_reference": "kernel-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-70.105.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.aarch64"
},
"product_reference": "kernel-tools-0:5.14.0-70.105.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-70.105.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.ppc64le"
},
"product_reference": "kernel-tools-0:5.14.0-70.105.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "kernel-tools-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-70.105.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.x86_64"
},
"product_reference": "kernel-tools-0:5.14.0-70.105.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-70.105.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.aarch64"
},
"product_reference": "kernel-tools-libs-0:5.14.0-70.105.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-70.105.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.ppc64le"
},
"product_reference": "kernel-tools-libs-0:5.14.0-70.105.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-70.105.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.x86_64"
},
"product_reference": "kernel-tools-libs-0:5.14.0-70.105.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-core-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-debuginfo-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-devel-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-matched-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-devel-matched-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-modules-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-modules-extra-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-70.105.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.aarch64"
},
"product_reference": "perf-0:5.14.0-70.105.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-70.105.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.ppc64le"
},
"product_reference": "perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "perf-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-70.105.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.x86_64"
},
"product_reference": "perf-0:5.14.0-70.105.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64"
},
"product_reference": "perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le"
},
"product_reference": "perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64"
},
"product_reference": "perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-70.105.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.aarch64"
},
"product_reference": "python3-perf-0:5.14.0-70.105.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-70.105.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.ppc64le"
},
"product_reference": "python3-perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "python3-perf-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-70.105.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.x86_64"
},
"product_reference": "python3-perf-0:5.14.0-70.105.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-52434",
"discovery_date": "2024-02-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2265285"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the smb client in the Linux kernel. A potential out-of-bounds error was seen in the smb2_parse_contexts() function. Validate offsets and lengths before dereferencing create contexts in smb2_parse_contexts().",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: smb: client: fix potential OOBs in smb2_parse_contexts()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.src",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-abi-stablelists-0:5.14.0-70.105.1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-aarch64-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-s390x-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-doc-0:5.14.0-70.105.1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-core-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-devel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-modules-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.src",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-abi-stablelists-0:5.14.0-70.105.1.el9_0.noarch",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-aarch64-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-s390x-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-doc-0:5.14.0-70.105.1.el9_0.noarch",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-core-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-devel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-modules-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-52434"
},
{
"category": "external",
"summary": "RHBZ#2265285",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265285"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-52434",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52434"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-52434",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-52434"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=17a0f64cc02d4972e21c733d9f21d1c512963afa",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=17a0f64cc02d4972e21c733d9f21d1c512963afa"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=af1689a9b7701d9907dfc84d2a4b57c4bc907144",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=af1689a9b7701d9907dfc84d2a4b57c4bc907144"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024022033-makeshift-flammable-cb72@gregkh/T/#u",
"url": "https://lore.kernel.org/linux-cve-announce/2024022033-makeshift-flammable-cb72@gregkh/T/#u"
}
],
"release_date": "2024-02-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-07-09T09:24:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.src",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-abi-stablelists-0:5.14.0-70.105.1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-aarch64-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-s390x-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-doc-0:5.14.0-70.105.1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-core-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-devel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-modules-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.src",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-abi-stablelists-0:5.14.0-70.105.1.el9_0.noarch",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-aarch64-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-s390x-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-doc-0:5.14.0-70.105.1.el9_0.noarch",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-core-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-devel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-modules-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:4415"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent module cifs from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.src",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-abi-stablelists-0:5.14.0-70.105.1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-aarch64-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-s390x-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-doc-0:5.14.0-70.105.1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-core-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-devel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-modules-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.src",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-abi-stablelists-0:5.14.0-70.105.1.el9_0.noarch",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-aarch64-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-s390x-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-doc-0:5.14.0-70.105.1.el9_0.noarch",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-core-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-devel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-modules-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.src",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-abi-stablelists-0:5.14.0-70.105.1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-aarch64-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-s390x-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-doc-0:5.14.0-70.105.1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-core-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-devel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-modules-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.src",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-abi-stablelists-0:5.14.0-70.105.1.el9_0.noarch",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-aarch64-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-s390x-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-doc-0:5.14.0-70.105.1.el9_0.noarch",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-core-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-devel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-modules-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: smb: client: fix potential OOBs in smb2_parse_contexts()"
},
{
"cve": "CVE-2024-0193",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2023-12-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2255653"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the netfilter subsystem of the Linux kernel. If the catchall element is garbage-collected when the pipapo set is removed, the element can be deactivated twice. This can cause a use-after-free issue on an NFT_CHAIN object or NFT_OBJECT object, allowing a local unprivileged user with CAP_NET_ADMIN capability to escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: netfilter: use-after-free in nft_trans_gc_catchall_sync leads to privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The upstream commit that introduced this flaw (5f68718b34a5 \"netfilter: nf_tables: GC transaction API to avoid race with control plane\") is not included in any shipped kernel releases of Red Hat Enterprise Linux 6, 7, and 8.\n\nOnly local users with `CAP_NET_ADMIN` capability or root can trigger this issue. \nOn Red Hat Enterprise Linux, local unprivileged users can exploit unprivileged user namespaces (CONFIG_USER_NS) to grant themselves this capability.\n\nThe OpenShift Container Platform (OCP) control planes or master machines are based on Red Hat Enterprise Linux CoreOS (RHCOS) that consists primarily of RHEL components, therefore, it is also affected by this kernel vulnerability. A successful exploit needs necessary privileges (CAP_NET_ADMIN) and direct, local access. A local user in RHCOS is already a root with full permissions, hence existence of this vulnerability does not bring any value from the potential attacker perspective. From the OpenShift containers perspective, this vulnerability cannot be exploited as in OpenShift the cluster processes on the node are namespaced, which means that switching the namespace in the running OpenShift container will not bring necessary capabilities.\nThis means that for OpenShift, the impact of this vulnerability is Low.\n\nSimilar to the CVE-2023-32233 vulnerability, this has been explained in the following blog post as an example of a \"Container escape vulnerability\":\nhttps://www.redhat.com/en/blog/containers-vulnerability-risk-assessment",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.src",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-abi-stablelists-0:5.14.0-70.105.1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-aarch64-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-s390x-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-doc-0:5.14.0-70.105.1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-core-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-devel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-modules-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.src",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-abi-stablelists-0:5.14.0-70.105.1.el9_0.noarch",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-aarch64-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-s390x-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-doc-0:5.14.0-70.105.1.el9_0.noarch",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-core-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-devel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-modules-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-0193"
},
{
"category": "external",
"summary": "RHBZ#2255653",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255653"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-0193",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0193"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0193",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0193"
}
],
"release_date": "2024-01-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-07-09T09:24:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.src",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-abi-stablelists-0:5.14.0-70.105.1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-aarch64-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-s390x-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-doc-0:5.14.0-70.105.1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-core-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-devel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-modules-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.src",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-abi-stablelists-0:5.14.0-70.105.1.el9_0.noarch",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-aarch64-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-s390x-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-doc-0:5.14.0-70.105.1.el9_0.noarch",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-core-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-devel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-modules-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:4415"
},
{
"category": "workaround",
"details": "In order to trigger the issue, it requires the ability to create user/net namespaces.\n\nOn non-containerized deployments of Red Hat Enterprise Linux 8, you can disable user namespaces by setting user.max_user_namespaces to 0:\n\n# echo \"user.max_user_namespaces=0\" \u003e /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf\n\nOn containerized deployments, such as Red Hat OpenShift Container Platform, do not use this mitigation as the functionality is needed to be enabled.",
"product_ids": [
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.src",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-abi-stablelists-0:5.14.0-70.105.1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-aarch64-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-s390x-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-doc-0:5.14.0-70.105.1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-core-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-devel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-modules-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.src",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-abi-stablelists-0:5.14.0-70.105.1.el9_0.noarch",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-aarch64-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-s390x-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-doc-0:5.14.0-70.105.1.el9_0.noarch",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-core-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-devel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-modules-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.src",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-abi-stablelists-0:5.14.0-70.105.1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-aarch64-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-s390x-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-doc-0:5.14.0-70.105.1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-core-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-devel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-modules-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.src",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-abi-stablelists-0:5.14.0-70.105.1.el9_0.noarch",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-aarch64-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-s390x-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-doc-0:5.14.0-70.105.1.el9_0.noarch",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-core-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-devel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-modules-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: netfilter: use-after-free in nft_trans_gc_catchall_sync leads to privilege escalation"
},
{
"cve": "CVE-2024-26598",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2024-02-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2265801"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel pertaining to a potential use-after-free (UAF) scenario in a system involving Logical Partitioning Interrupts (LPI) translation cache operations. Specifically, the issue arises when a cache hit occurs concurrently with an operation that invalidates the cache, such as a DISCARD ITS command. The root cause is traced to vgic_its_check_cache() not appropriately managing the reference count of the vgic_irq object. Upon returning from this function, the reference count of vgic_irq is not incremented. This issue can lead to the object being prematurely freed while still in use by other parts of the system, potentially resulting in undefined behavior or system instability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: kvm: Avoid potential UAF in LPI translation cache",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The vulnerability is assessed as having a Moderate severity due to its potential to cause system instability or undefined behavior under specific conditions. Specifically, the issue arises from concurrent operations involving the LPI translation cache and commands that invalidate this cache, such as DISCARD ITS commands. The root cause lies in vgic_its_check_cache() failing to increment the reference count of the vgic_irq object before releasing the lock. This oversight can lead to a use-after-free scenario where the object may be prematurely freed while still in use elsewhere in the system. As a consequence, if the object is accessed or modified after being freed, it can result in unpredictable behavior, crashes, or even security vulnerabilities if an attacker can control the timing of cache invalidation and subsequent accesses.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.src",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-abi-stablelists-0:5.14.0-70.105.1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-aarch64-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-s390x-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-doc-0:5.14.0-70.105.1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-core-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-devel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-modules-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.src",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-abi-stablelists-0:5.14.0-70.105.1.el9_0.noarch",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-aarch64-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-s390x-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-doc-0:5.14.0-70.105.1.el9_0.noarch",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-core-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-devel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-modules-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-26598"
},
{
"category": "external",
"summary": "RHBZ#2265801",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265801"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-26598",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26598"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-26598",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26598"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024022338-CVE-2024-26598-24f4@gregkh/T/#u",
"url": "https://lore.kernel.org/linux-cve-announce/2024022338-CVE-2024-26598-24f4@gregkh/T/#u"
}
],
"release_date": "2024-02-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-07-09T09:24:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.src",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-abi-stablelists-0:5.14.0-70.105.1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-aarch64-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-s390x-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-doc-0:5.14.0-70.105.1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-core-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-devel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-modules-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.src",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-abi-stablelists-0:5.14.0-70.105.1.el9_0.noarch",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-aarch64-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-s390x-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-doc-0:5.14.0-70.105.1.el9_0.noarch",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-core-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-devel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-modules-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:4415"
},
{
"category": "workaround",
"details": "No mitigation is currently available for this vulnerability. Make sure to perform the updates as they become available.",
"product_ids": [
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.src",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-abi-stablelists-0:5.14.0-70.105.1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-aarch64-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-s390x-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-doc-0:5.14.0-70.105.1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-core-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-devel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-modules-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.src",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-abi-stablelists-0:5.14.0-70.105.1.el9_0.noarch",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-aarch64-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-s390x-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-doc-0:5.14.0-70.105.1.el9_0.noarch",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-core-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-devel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-modules-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.src",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-abi-stablelists-0:5.14.0-70.105.1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-aarch64-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-s390x-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-doc-0:5.14.0-70.105.1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-core-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-devel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-modules-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.src",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-abi-stablelists-0:5.14.0-70.105.1.el9_0.noarch",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-aarch64-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-s390x-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-doc-0:5.14.0-70.105.1.el9_0.noarch",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-core-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-devel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-modules-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: kvm: Avoid potential UAF in LPI translation cache"
},
{
"cve": "CVE-2024-26673",
"cwe": {
"id": "CWE-99",
"name": "Improper Control of Resource Identifiers (\u0027Resource Injection\u0027)"
},
"discovery_date": "2024-04-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2272816"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations\n\n- Disallow families other than NFPROTO_{IPV4,IPV6,INET}.\n- Disallow layer 4 protocol with no ports, since destination port is a\n mandatory attribute for this object.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: netfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.src",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-abi-stablelists-0:5.14.0-70.105.1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-aarch64-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-s390x-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-doc-0:5.14.0-70.105.1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-core-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-devel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-modules-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.src",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-abi-stablelists-0:5.14.0-70.105.1.el9_0.noarch",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-aarch64-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-s390x-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-doc-0:5.14.0-70.105.1.el9_0.noarch",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-core-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-devel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-modules-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-26673"
},
{
"category": "external",
"summary": "RHBZ#2272816",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272816"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-26673",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26673"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-26673",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26673"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024040212-CVE-2024-26673-b2d3@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024040212-CVE-2024-26673-b2d3@gregkh/T"
}
],
"release_date": "2024-04-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-07-09T09:24:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.src",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-abi-stablelists-0:5.14.0-70.105.1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-aarch64-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-s390x-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-doc-0:5.14.0-70.105.1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-core-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-devel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-modules-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.src",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-abi-stablelists-0:5.14.0-70.105.1.el9_0.noarch",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-aarch64-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-s390x-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-doc-0:5.14.0-70.105.1.el9_0.noarch",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-core-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-devel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-modules-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:4415"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.src",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-abi-stablelists-0:5.14.0-70.105.1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-aarch64-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-s390x-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-doc-0:5.14.0-70.105.1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-core-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-devel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-modules-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.src",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-abi-stablelists-0:5.14.0-70.105.1.el9_0.noarch",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-aarch64-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-s390x-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-doc-0:5.14.0-70.105.1.el9_0.noarch",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-core-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-devel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-modules-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: netfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations"
},
{
"cve": "CVE-2024-35890",
"discovery_date": "2024-05-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2281689"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u0027s Generic Receive Offload (GRO) feature, where packets processed with a fragment list are not properly orphaned due to incorrect handling of socket references. This vulnerability can cause system instability or kernel bugs. The issue has been fixed by making sure that socket references are correctly removed during packet processing. Users should update their kernel to the patched version to mitigate this risk.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: gro: fix ownership transfer",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.src",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-abi-stablelists-0:5.14.0-70.105.1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-aarch64-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-s390x-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-doc-0:5.14.0-70.105.1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-core-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-devel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-modules-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.src",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-abi-stablelists-0:5.14.0-70.105.1.el9_0.noarch",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-aarch64-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-s390x-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-doc-0:5.14.0-70.105.1.el9_0.noarch",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-core-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-devel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-modules-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-35890"
},
{
"category": "external",
"summary": "RHBZ#2281689",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2281689"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-35890",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35890"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-35890",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-35890"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024051948-CVE-2024-35890-beaa@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024051948-CVE-2024-35890-beaa@gregkh/T"
}
],
"release_date": "2024-05-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-07-09T09:24:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.src",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-abi-stablelists-0:5.14.0-70.105.1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-aarch64-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-s390x-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-doc-0:5.14.0-70.105.1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-core-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-devel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-modules-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.src",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-abi-stablelists-0:5.14.0-70.105.1.el9_0.noarch",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-aarch64-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-s390x-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-doc-0:5.14.0-70.105.1.el9_0.noarch",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-core-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-devel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-modules-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:4415"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.src",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-abi-stablelists-0:5.14.0-70.105.1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-aarch64-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-s390x-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-doc-0:5.14.0-70.105.1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-core-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-devel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-modules-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.src",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-abi-stablelists-0:5.14.0-70.105.1.el9_0.noarch",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-aarch64-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-s390x-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-doc-0:5.14.0-70.105.1.el9_0.noarch",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-core-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-devel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-modules-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: gro: fix ownership transfer"
}
]
}
RHSA-2024_4415
Vulnerability from csaf_redhat - Published: 2024-07-09 09:24 - Updated: 2024-12-06 11:10Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: netfilter: use-after-free in nft_trans_gc_catchall_sync leads to privilege escalation (CVE-2024-0193)\n\n* kernel: smb: client: fix potential OOBs in smb2_parse_contexts() (CVE-2023-52434)\n\n* kernel: kvm: Avoid potential UAF in LPI translation cache (CVE-2024-26598)\n\n* kernel: netfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations (CVE-2024-26673)\n\nBug Fix(es):\n\n* multi-page bvec configuration for integrity payload (JIRA:RHEL-15150)\n\n* ipoib mcast lockup fix (JIRA:RHEL-30259)\n\n* Kernel panic in skb_segment (JIRA:RHEL-30560)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:4415",
"url": "https://access.redhat.com/errata/RHSA-2024:4415"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2255653",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255653"
},
{
"category": "external",
"summary": "2265285",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265285"
},
{
"category": "external",
"summary": "2265801",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265801"
},
{
"category": "external",
"summary": "2272816",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272816"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_4415.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2024-12-06T11:10:17+00:00",
"generator": {
"date": "2024-12-06T11:10:17+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.2"
}
},
"id": "RHSA-2024:4415",
"initial_release_date": "2024-07-09T09:24:52+00:00",
"revision_history": [
{
"date": "2024-07-09T09:24:52+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-07-09T09:24:52+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-06T11:10:17+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product": {
"name": "Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_e4s:9.0::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:9.0::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:5.14.0-70.105.1.el9_0.aarch64",
"product": {
"name": "bpftool-0:5.14.0-70.105.1.el9_0.aarch64",
"product_id": "bpftool-0:5.14.0-70.105.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@5.14.0-70.105.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:5.14.0-70.105.1.el9_0.aarch64",
"product": {
"name": "kernel-0:5.14.0-70.105.1.el9_0.aarch64",
"product_id": "kernel-0:5.14.0-70.105.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@5.14.0-70.105.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:5.14.0-70.105.1.el9_0.aarch64",
"product": {
"name": "kernel-core-0:5.14.0-70.105.1.el9_0.aarch64",
"product_id": "kernel-core-0:5.14.0-70.105.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@5.14.0-70.105.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:5.14.0-70.105.1.el9_0.aarch64",
"product": {
"name": "kernel-debug-0:5.14.0-70.105.1.el9_0.aarch64",
"product_id": "kernel-debug-0:5.14.0-70.105.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@5.14.0-70.105.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:5.14.0-70.105.1.el9_0.aarch64",
"product": {
"name": "kernel-debug-core-0:5.14.0-70.105.1.el9_0.aarch64",
"product_id": "kernel-debug-core-0:5.14.0-70.105.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@5.14.0-70.105.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"product": {
"name": "kernel-debug-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"product_id": "kernel-debug-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@5.14.0-70.105.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"product": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"product_id": "kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@5.14.0-70.105.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"product": {
"name": "kernel-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"product_id": "kernel-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@5.14.0-70.105.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"product": {
"name": "kernel-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"product_id": "kernel-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@5.14.0-70.105.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:5.14.0-70.105.1.el9_0.aarch64",
"product": {
"name": "kernel-tools-0:5.14.0-70.105.1.el9_0.aarch64",
"product_id": "kernel-tools-0:5.14.0-70.105.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@5.14.0-70.105.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:5.14.0-70.105.1.el9_0.aarch64",
"product": {
"name": "kernel-tools-libs-0:5.14.0-70.105.1.el9_0.aarch64",
"product_id": "kernel-tools-libs-0:5.14.0-70.105.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@5.14.0-70.105.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:5.14.0-70.105.1.el9_0.aarch64",
"product": {
"name": "python3-perf-0:5.14.0-70.105.1.el9_0.aarch64",
"product_id": "python3-perf-0:5.14.0-70.105.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@5.14.0-70.105.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"product": {
"name": "bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"product_id": "bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@5.14.0-70.105.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"product": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"product_id": "kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@5.14.0-70.105.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"product": {
"name": "kernel-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"product_id": "kernel-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@5.14.0-70.105.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-aarch64-0:5.14.0-70.105.1.el9_0.aarch64",
"product": {
"name": "kernel-debuginfo-common-aarch64-0:5.14.0-70.105.1.el9_0.aarch64",
"product_id": "kernel-debuginfo-common-aarch64-0:5.14.0-70.105.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@5.14.0-70.105.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"product": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"product_id": "kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@5.14.0-70.105.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"product": {
"name": "perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"product_id": "perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@5.14.0-70.105.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"product": {
"name": "python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"product_id": "python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@5.14.0-70.105.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"product": {
"name": "kernel-debug-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"product_id": "kernel-debug-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@5.14.0-70.105.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"product": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"product_id": "kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel-matched@5.14.0-70.105.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"product": {
"name": "kernel-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"product_id": "kernel-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@5.14.0-70.105.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"product": {
"name": "kernel-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"product_id": "kernel-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel-matched@5.14.0-70.105.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:5.14.0-70.105.1.el9_0.aarch64",
"product": {
"name": "kernel-headers-0:5.14.0-70.105.1.el9_0.aarch64",
"product_id": "kernel-headers-0:5.14.0-70.105.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@5.14.0-70.105.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-0:5.14.0-70.105.1.el9_0.aarch64",
"product": {
"name": "perf-0:5.14.0-70.105.1.el9_0.aarch64",
"product_id": "perf-0:5.14.0-70.105.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@5.14.0-70.105.1.el9_0?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:5.14.0-70.105.1.el9_0.ppc64le",
"product": {
"name": "bpftool-0:5.14.0-70.105.1.el9_0.ppc64le",
"product_id": "bpftool-0:5.14.0-70.105.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@5.14.0-70.105.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:5.14.0-70.105.1.el9_0.ppc64le",
"product": {
"name": "kernel-0:5.14.0-70.105.1.el9_0.ppc64le",
"product_id": "kernel-0:5.14.0-70.105.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@5.14.0-70.105.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"product": {
"name": "kernel-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"product_id": "kernel-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@5.14.0-70.105.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:5.14.0-70.105.1.el9_0.ppc64le",
"product": {
"name": "kernel-debug-0:5.14.0-70.105.1.el9_0.ppc64le",
"product_id": "kernel-debug-0:5.14.0-70.105.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@5.14.0-70.105.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"product": {
"name": "kernel-debug-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"product_id": "kernel-debug-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@5.14.0-70.105.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"product": {
"name": "kernel-debug-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"product_id": "kernel-debug-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@5.14.0-70.105.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"product": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"product_id": "kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@5.14.0-70.105.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"product": {
"name": "kernel-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"product_id": "kernel-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@5.14.0-70.105.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"product": {
"name": "kernel-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"product_id": "kernel-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@5.14.0-70.105.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:5.14.0-70.105.1.el9_0.ppc64le",
"product": {
"name": "kernel-tools-0:5.14.0-70.105.1.el9_0.ppc64le",
"product_id": "kernel-tools-0:5.14.0-70.105.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@5.14.0-70.105.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:5.14.0-70.105.1.el9_0.ppc64le",
"product": {
"name": "kernel-tools-libs-0:5.14.0-70.105.1.el9_0.ppc64le",
"product_id": "kernel-tools-libs-0:5.14.0-70.105.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@5.14.0-70.105.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"product": {
"name": "python3-perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"product_id": "python3-perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@5.14.0-70.105.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"product_id": "bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@5.14.0-70.105.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"product_id": "kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@5.14.0-70.105.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"product": {
"name": "kernel-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"product_id": "kernel-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@5.14.0-70.105.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:5.14.0-70.105.1.el9_0.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:5.14.0-70.105.1.el9_0.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:5.14.0-70.105.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@5.14.0-70.105.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"product_id": "kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@5.14.0-70.105.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"product": {
"name": "perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"product_id": "perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@5.14.0-70.105.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"product": {
"name": "python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"product_id": "python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@5.14.0-70.105.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"product": {
"name": "kernel-debug-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"product_id": "kernel-debug-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@5.14.0-70.105.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"product": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"product_id": "kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel-matched@5.14.0-70.105.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"product": {
"name": "kernel-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"product_id": "kernel-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@5.14.0-70.105.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"product": {
"name": "kernel-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"product_id": "kernel-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel-matched@5.14.0-70.105.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:5.14.0-70.105.1.el9_0.ppc64le",
"product": {
"name": "kernel-headers-0:5.14.0-70.105.1.el9_0.ppc64le",
"product_id": "kernel-headers-0:5.14.0-70.105.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@5.14.0-70.105.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"product": {
"name": "perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"product_id": "perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@5.14.0-70.105.1.el9_0?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:5.14.0-70.105.1.el9_0.x86_64",
"product": {
"name": "bpftool-0:5.14.0-70.105.1.el9_0.x86_64",
"product_id": "bpftool-0:5.14.0-70.105.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@5.14.0-70.105.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:5.14.0-70.105.1.el9_0.x86_64",
"product": {
"name": "kernel-0:5.14.0-70.105.1.el9_0.x86_64",
"product_id": "kernel-0:5.14.0-70.105.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@5.14.0-70.105.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:5.14.0-70.105.1.el9_0.x86_64",
"product": {
"name": "kernel-core-0:5.14.0-70.105.1.el9_0.x86_64",
"product_id": "kernel-core-0:5.14.0-70.105.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@5.14.0-70.105.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:5.14.0-70.105.1.el9_0.x86_64",
"product": {
"name": "kernel-debug-0:5.14.0-70.105.1.el9_0.x86_64",
"product_id": "kernel-debug-0:5.14.0-70.105.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@5.14.0-70.105.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:5.14.0-70.105.1.el9_0.x86_64",
"product": {
"name": "kernel-debug-core-0:5.14.0-70.105.1.el9_0.x86_64",
"product_id": "kernel-debug-core-0:5.14.0-70.105.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@5.14.0-70.105.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"product": {
"name": "kernel-debug-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"product_id": "kernel-debug-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@5.14.0-70.105.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"product": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"product_id": "kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@5.14.0-70.105.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"product": {
"name": "kernel-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"product_id": "kernel-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@5.14.0-70.105.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"product": {
"name": "kernel-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"product_id": "kernel-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@5.14.0-70.105.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:5.14.0-70.105.1.el9_0.x86_64",
"product": {
"name": "kernel-tools-0:5.14.0-70.105.1.el9_0.x86_64",
"product_id": "kernel-tools-0:5.14.0-70.105.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@5.14.0-70.105.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:5.14.0-70.105.1.el9_0.x86_64",
"product": {
"name": "kernel-tools-libs-0:5.14.0-70.105.1.el9_0.x86_64",
"product_id": "kernel-tools-libs-0:5.14.0-70.105.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@5.14.0-70.105.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:5.14.0-70.105.1.el9_0.x86_64",
"product": {
"name": "python3-perf-0:5.14.0-70.105.1.el9_0.x86_64",
"product_id": "python3-perf-0:5.14.0-70.105.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@5.14.0-70.105.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"product": {
"name": "bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"product_id": "bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@5.14.0-70.105.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"product_id": "kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@5.14.0-70.105.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"product": {
"name": "kernel-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"product_id": "kernel-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@5.14.0-70.105.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:5.14.0-70.105.1.el9_0.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:5.14.0-70.105.1.el9_0.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:5.14.0-70.105.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@5.14.0-70.105.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"product_id": "kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@5.14.0-70.105.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"product": {
"name": "perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"product_id": "perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@5.14.0-70.105.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"product_id": "python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@5.14.0-70.105.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"product": {
"name": "kernel-debug-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"product_id": "kernel-debug-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@5.14.0-70.105.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"product": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"product_id": "kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel-matched@5.14.0-70.105.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"product": {
"name": "kernel-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"product_id": "kernel-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@5.14.0-70.105.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"product": {
"name": "kernel-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"product_id": "kernel-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel-matched@5.14.0-70.105.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:5.14.0-70.105.1.el9_0.x86_64",
"product": {
"name": "kernel-headers-0:5.14.0-70.105.1.el9_0.x86_64",
"product_id": "kernel-headers-0:5.14.0-70.105.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@5.14.0-70.105.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:5.14.0-70.105.1.el9_0.x86_64",
"product": {
"name": "perf-0:5.14.0-70.105.1.el9_0.x86_64",
"product_id": "perf-0:5.14.0-70.105.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@5.14.0-70.105.1.el9_0?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:5.14.0-70.105.1.el9_0.s390x",
"product": {
"name": "bpftool-0:5.14.0-70.105.1.el9_0.s390x",
"product_id": "bpftool-0:5.14.0-70.105.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@5.14.0-70.105.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:5.14.0-70.105.1.el9_0.s390x",
"product": {
"name": "kernel-0:5.14.0-70.105.1.el9_0.s390x",
"product_id": "kernel-0:5.14.0-70.105.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@5.14.0-70.105.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:5.14.0-70.105.1.el9_0.s390x",
"product": {
"name": "kernel-core-0:5.14.0-70.105.1.el9_0.s390x",
"product_id": "kernel-core-0:5.14.0-70.105.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@5.14.0-70.105.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:5.14.0-70.105.1.el9_0.s390x",
"product": {
"name": "kernel-debug-0:5.14.0-70.105.1.el9_0.s390x",
"product_id": "kernel-debug-0:5.14.0-70.105.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@5.14.0-70.105.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:5.14.0-70.105.1.el9_0.s390x",
"product": {
"name": "kernel-debug-core-0:5.14.0-70.105.1.el9_0.s390x",
"product_id": "kernel-debug-core-0:5.14.0-70.105.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@5.14.0-70.105.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:5.14.0-70.105.1.el9_0.s390x",
"product": {
"name": "kernel-debug-modules-0:5.14.0-70.105.1.el9_0.s390x",
"product_id": "kernel-debug-modules-0:5.14.0-70.105.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@5.14.0-70.105.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"product": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"product_id": "kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@5.14.0-70.105.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:5.14.0-70.105.1.el9_0.s390x",
"product": {
"name": "kernel-modules-0:5.14.0-70.105.1.el9_0.s390x",
"product_id": "kernel-modules-0:5.14.0-70.105.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@5.14.0-70.105.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"product": {
"name": "kernel-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"product_id": "kernel-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@5.14.0-70.105.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:5.14.0-70.105.1.el9_0.s390x",
"product": {
"name": "kernel-tools-0:5.14.0-70.105.1.el9_0.s390x",
"product_id": "kernel-tools-0:5.14.0-70.105.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@5.14.0-70.105.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-0:5.14.0-70.105.1.el9_0.s390x",
"product": {
"name": "kernel-zfcpdump-0:5.14.0-70.105.1.el9_0.s390x",
"product_id": "kernel-zfcpdump-0:5.14.0-70.105.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump@5.14.0-70.105.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-core-0:5.14.0-70.105.1.el9_0.s390x",
"product": {
"name": "kernel-zfcpdump-core-0:5.14.0-70.105.1.el9_0.s390x",
"product_id": "kernel-zfcpdump-core-0:5.14.0-70.105.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-core@5.14.0-70.105.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-0:5.14.0-70.105.1.el9_0.s390x",
"product": {
"name": "kernel-zfcpdump-modules-0:5.14.0-70.105.1.el9_0.s390x",
"product_id": "kernel-zfcpdump-modules-0:5.14.0-70.105.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@5.14.0-70.105.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"product": {
"name": "kernel-zfcpdump-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"product_id": "kernel-zfcpdump-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@5.14.0-70.105.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:5.14.0-70.105.1.el9_0.s390x",
"product": {
"name": "python3-perf-0:5.14.0-70.105.1.el9_0.s390x",
"product_id": "python3-perf-0:5.14.0-70.105.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@5.14.0-70.105.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"product": {
"name": "bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"product_id": "bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@5.14.0-70.105.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"product_id": "kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@5.14.0-70.105.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"product": {
"name": "kernel-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"product_id": "kernel-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@5.14.0-70.105.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:5.14.0-70.105.1.el9_0.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:5.14.0-70.105.1.el9_0.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:5.14.0-70.105.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@5.14.0-70.105.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"product": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"product_id": "kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@5.14.0-70.105.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"product": {
"name": "kernel-zfcpdump-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"product_id": "kernel-zfcpdump-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@5.14.0-70.105.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"product": {
"name": "perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"product_id": "perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@5.14.0-70.105.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"product": {
"name": "python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"product_id": "python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@5.14.0-70.105.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:5.14.0-70.105.1.el9_0.s390x",
"product": {
"name": "kernel-debug-devel-0:5.14.0-70.105.1.el9_0.s390x",
"product_id": "kernel-debug-devel-0:5.14.0-70.105.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@5.14.0-70.105.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"product": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"product_id": "kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel-matched@5.14.0-70.105.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:5.14.0-70.105.1.el9_0.s390x",
"product": {
"name": "kernel-devel-0:5.14.0-70.105.1.el9_0.s390x",
"product_id": "kernel-devel-0:5.14.0-70.105.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@5.14.0-70.105.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"product": {
"name": "kernel-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"product_id": "kernel-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel-matched@5.14.0-70.105.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:5.14.0-70.105.1.el9_0.s390x",
"product": {
"name": "kernel-headers-0:5.14.0-70.105.1.el9_0.s390x",
"product_id": "kernel-headers-0:5.14.0-70.105.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@5.14.0-70.105.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-0:5.14.0-70.105.1.el9_0.s390x",
"product": {
"name": "kernel-zfcpdump-devel-0:5.14.0-70.105.1.el9_0.s390x",
"product_id": "kernel-zfcpdump-devel-0:5.14.0-70.105.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@5.14.0-70.105.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"product": {
"name": "kernel-zfcpdump-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"product_id": "kernel-zfcpdump-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel-matched@5.14.0-70.105.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:5.14.0-70.105.1.el9_0.s390x",
"product": {
"name": "perf-0:5.14.0-70.105.1.el9_0.s390x",
"product_id": "perf-0:5.14.0-70.105.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@5.14.0-70.105.1.el9_0?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:5.14.0-70.105.1.el9_0.src",
"product": {
"name": "kernel-0:5.14.0-70.105.1.el9_0.src",
"product_id": "kernel-0:5.14.0-70.105.1.el9_0.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@5.14.0-70.105.1.el9_0?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-stablelists-0:5.14.0-70.105.1.el9_0.noarch",
"product": {
"name": "kernel-abi-stablelists-0:5.14.0-70.105.1.el9_0.noarch",
"product_id": "kernel-abi-stablelists-0:5.14.0-70.105.1.el9_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-stablelists@5.14.0-70.105.1.el9_0?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:5.14.0-70.105.1.el9_0.noarch",
"product": {
"name": "kernel-doc-0:5.14.0-70.105.1.el9_0.noarch",
"product_id": "kernel-doc-0:5.14.0-70.105.1.el9_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@5.14.0-70.105.1.el9_0?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-70.105.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.aarch64"
},
"product_reference": "bpftool-0:5.14.0-70.105.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-70.105.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.ppc64le"
},
"product_reference": "bpftool-0:5.14.0-70.105.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "bpftool-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-70.105.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.x86_64"
},
"product_reference": "bpftool-0:5.14.0-70.105.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-70.105.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.aarch64"
},
"product_reference": "kernel-0:5.14.0-70.105.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-70.105.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.ppc64le"
},
"product_reference": "kernel-0:5.14.0-70.105.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "kernel-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-70.105.1.el9_0.src as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.src"
},
"product_reference": "kernel-0:5.14.0-70.105.1.el9_0.src",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-70.105.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.x86_64"
},
"product_reference": "kernel-0:5.14.0-70.105.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:5.14.0-70.105.1.el9_0.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-abi-stablelists-0:5.14.0-70.105.1.el9_0.noarch"
},
"product_reference": "kernel-abi-stablelists-0:5.14.0-70.105.1.el9_0.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-70.105.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.aarch64"
},
"product_reference": "kernel-core-0:5.14.0-70.105.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-70.105.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.ppc64le"
},
"product_reference": "kernel-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "kernel-core-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-70.105.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.x86_64"
},
"product_reference": "kernel-core-0:5.14.0-70.105.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-70.105.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-0:5.14.0-70.105.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-70.105.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-0:5.14.0-70.105.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "kernel-debug-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-70.105.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-0:5.14.0-70.105.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-70.105.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-core-0:5.14.0-70.105.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-70.105.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "kernel-debug-core-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-70.105.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-core-0:5.14.0-70.105.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-70.105.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-70.105.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "kernel-debug-devel-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-70.105.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-70.105.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-70.105.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "kernel-debug-modules-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-70.105.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64"
},
"product_reference": "kernel-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le"
},
"product_reference": "kernel-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "kernel-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64"
},
"product_reference": "kernel-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:5.14.0-70.105.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-aarch64-0:5.14.0-70.105.1.el9_0.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:5.14.0-70.105.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:5.14.0-70.105.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:5.14.0-70.105.1.el9_0.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:5.14.0-70.105.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-s390x-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:5.14.0-70.105.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:5.14.0-70.105.1.el9_0.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:5.14.0-70.105.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-70.105.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.aarch64"
},
"product_reference": "kernel-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-70.105.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.ppc64le"
},
"product_reference": "kernel-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "kernel-devel-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-70.105.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.x86_64"
},
"product_reference": "kernel-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64"
},
"product_reference": "kernel-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le"
},
"product_reference": "kernel-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "kernel-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64"
},
"product_reference": "kernel-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:5.14.0-70.105.1.el9_0.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-doc-0:5.14.0-70.105.1.el9_0.noarch"
},
"product_reference": "kernel-doc-0:5.14.0-70.105.1.el9_0.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-70.105.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.aarch64"
},
"product_reference": "kernel-headers-0:5.14.0-70.105.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-70.105.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.ppc64le"
},
"product_reference": "kernel-headers-0:5.14.0-70.105.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "kernel-headers-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-70.105.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.x86_64"
},
"product_reference": "kernel-headers-0:5.14.0-70.105.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-70.105.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.aarch64"
},
"product_reference": "kernel-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-70.105.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.ppc64le"
},
"product_reference": "kernel-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "kernel-modules-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-70.105.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.x86_64"
},
"product_reference": "kernel-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64"
},
"product_reference": "kernel-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le"
},
"product_reference": "kernel-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "kernel-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64"
},
"product_reference": "kernel-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-70.105.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.aarch64"
},
"product_reference": "kernel-tools-0:5.14.0-70.105.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-70.105.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.ppc64le"
},
"product_reference": "kernel-tools-0:5.14.0-70.105.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "kernel-tools-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-70.105.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.x86_64"
},
"product_reference": "kernel-tools-0:5.14.0-70.105.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-70.105.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.aarch64"
},
"product_reference": "kernel-tools-libs-0:5.14.0-70.105.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-70.105.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.ppc64le"
},
"product_reference": "kernel-tools-libs-0:5.14.0-70.105.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-70.105.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.x86_64"
},
"product_reference": "kernel-tools-libs-0:5.14.0-70.105.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-zfcpdump-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-zfcpdump-core-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-zfcpdump-debuginfo-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-zfcpdump-devel-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-matched-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-zfcpdump-devel-matched-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-zfcpdump-modules-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:kernel-zfcpdump-modules-extra-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-70.105.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.aarch64"
},
"product_reference": "perf-0:5.14.0-70.105.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-70.105.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.ppc64le"
},
"product_reference": "perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "perf-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-70.105.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.x86_64"
},
"product_reference": "perf-0:5.14.0-70.105.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64"
},
"product_reference": "perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le"
},
"product_reference": "perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64"
},
"product_reference": "perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-70.105.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.aarch64"
},
"product_reference": "python3-perf-0:5.14.0-70.105.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-70.105.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.ppc64le"
},
"product_reference": "python3-perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "python3-perf-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-70.105.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.x86_64"
},
"product_reference": "python3-perf-0:5.14.0-70.105.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-70.105.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.aarch64"
},
"product_reference": "bpftool-0:5.14.0-70.105.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-70.105.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.ppc64le"
},
"product_reference": "bpftool-0:5.14.0-70.105.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "bpftool-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-70.105.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.x86_64"
},
"product_reference": "bpftool-0:5.14.0-70.105.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-70.105.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.aarch64"
},
"product_reference": "kernel-0:5.14.0-70.105.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-70.105.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.ppc64le"
},
"product_reference": "kernel-0:5.14.0-70.105.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "kernel-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-70.105.1.el9_0.src as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.src"
},
"product_reference": "kernel-0:5.14.0-70.105.1.el9_0.src",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-70.105.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.x86_64"
},
"product_reference": "kernel-0:5.14.0-70.105.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:5.14.0-70.105.1.el9_0.noarch as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-abi-stablelists-0:5.14.0-70.105.1.el9_0.noarch"
},
"product_reference": "kernel-abi-stablelists-0:5.14.0-70.105.1.el9_0.noarch",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-70.105.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.aarch64"
},
"product_reference": "kernel-core-0:5.14.0-70.105.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-70.105.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.ppc64le"
},
"product_reference": "kernel-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "kernel-core-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-70.105.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.x86_64"
},
"product_reference": "kernel-core-0:5.14.0-70.105.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-70.105.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-0:5.14.0-70.105.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-70.105.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-0:5.14.0-70.105.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "kernel-debug-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-70.105.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-0:5.14.0-70.105.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-70.105.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-core-0:5.14.0-70.105.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-70.105.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "kernel-debug-core-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-70.105.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-core-0:5.14.0-70.105.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-70.105.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-70.105.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "kernel-debug-devel-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-70.105.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-70.105.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-70.105.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "kernel-debug-modules-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-70.105.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64"
},
"product_reference": "kernel-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le"
},
"product_reference": "kernel-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "kernel-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64"
},
"product_reference": "kernel-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:5.14.0-70.105.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-aarch64-0:5.14.0-70.105.1.el9_0.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:5.14.0-70.105.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:5.14.0-70.105.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:5.14.0-70.105.1.el9_0.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:5.14.0-70.105.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-s390x-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:5.14.0-70.105.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:5.14.0-70.105.1.el9_0.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:5.14.0-70.105.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-70.105.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.aarch64"
},
"product_reference": "kernel-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-70.105.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.ppc64le"
},
"product_reference": "kernel-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "kernel-devel-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-70.105.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.x86_64"
},
"product_reference": "kernel-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64"
},
"product_reference": "kernel-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le"
},
"product_reference": "kernel-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "kernel-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64"
},
"product_reference": "kernel-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:5.14.0-70.105.1.el9_0.noarch as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-doc-0:5.14.0-70.105.1.el9_0.noarch"
},
"product_reference": "kernel-doc-0:5.14.0-70.105.1.el9_0.noarch",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-70.105.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.aarch64"
},
"product_reference": "kernel-headers-0:5.14.0-70.105.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-70.105.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.ppc64le"
},
"product_reference": "kernel-headers-0:5.14.0-70.105.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "kernel-headers-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-70.105.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.x86_64"
},
"product_reference": "kernel-headers-0:5.14.0-70.105.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-70.105.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.aarch64"
},
"product_reference": "kernel-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-70.105.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.ppc64le"
},
"product_reference": "kernel-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "kernel-modules-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-70.105.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.x86_64"
},
"product_reference": "kernel-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64"
},
"product_reference": "kernel-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le"
},
"product_reference": "kernel-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "kernel-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64"
},
"product_reference": "kernel-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-70.105.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.aarch64"
},
"product_reference": "kernel-tools-0:5.14.0-70.105.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-70.105.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.ppc64le"
},
"product_reference": "kernel-tools-0:5.14.0-70.105.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "kernel-tools-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-70.105.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.x86_64"
},
"product_reference": "kernel-tools-0:5.14.0-70.105.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-70.105.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.aarch64"
},
"product_reference": "kernel-tools-libs-0:5.14.0-70.105.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-70.105.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.ppc64le"
},
"product_reference": "kernel-tools-libs-0:5.14.0-70.105.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-70.105.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.x86_64"
},
"product_reference": "kernel-tools-libs-0:5.14.0-70.105.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-core-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-debuginfo-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-devel-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-matched-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-devel-matched-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-modules-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-modules-extra-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-70.105.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.aarch64"
},
"product_reference": "perf-0:5.14.0-70.105.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-70.105.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.ppc64le"
},
"product_reference": "perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "perf-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-70.105.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.x86_64"
},
"product_reference": "perf-0:5.14.0-70.105.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64"
},
"product_reference": "perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le"
},
"product_reference": "perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64"
},
"product_reference": "perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-70.105.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.aarch64"
},
"product_reference": "python3-perf-0:5.14.0-70.105.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-70.105.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.ppc64le"
},
"product_reference": "python3-perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "python3-perf-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-70.105.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.x86_64"
},
"product_reference": "python3-perf-0:5.14.0-70.105.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-52434",
"discovery_date": "2024-02-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2265285"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the smb client in the Linux kernel. A potential out-of-bounds error was seen in the smb2_parse_contexts() function. Validate offsets and lengths before dereferencing create contexts in smb2_parse_contexts().",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: smb: client: fix potential OOBs in smb2_parse_contexts()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.src",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-abi-stablelists-0:5.14.0-70.105.1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-aarch64-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-s390x-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-doc-0:5.14.0-70.105.1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-core-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-devel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-modules-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.src",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-abi-stablelists-0:5.14.0-70.105.1.el9_0.noarch",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-aarch64-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-s390x-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-doc-0:5.14.0-70.105.1.el9_0.noarch",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-core-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-devel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-modules-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-52434"
},
{
"category": "external",
"summary": "RHBZ#2265285",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265285"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-52434",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52434"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-52434",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-52434"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=17a0f64cc02d4972e21c733d9f21d1c512963afa",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=17a0f64cc02d4972e21c733d9f21d1c512963afa"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=af1689a9b7701d9907dfc84d2a4b57c4bc907144",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=af1689a9b7701d9907dfc84d2a4b57c4bc907144"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024022033-makeshift-flammable-cb72@gregkh/T/#u",
"url": "https://lore.kernel.org/linux-cve-announce/2024022033-makeshift-flammable-cb72@gregkh/T/#u"
}
],
"release_date": "2024-02-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-07-09T09:24:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.src",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-abi-stablelists-0:5.14.0-70.105.1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-aarch64-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-s390x-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-doc-0:5.14.0-70.105.1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-core-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-devel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-modules-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.src",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-abi-stablelists-0:5.14.0-70.105.1.el9_0.noarch",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-aarch64-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-s390x-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-doc-0:5.14.0-70.105.1.el9_0.noarch",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-core-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-devel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-modules-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:4415"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent module cifs from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.src",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-abi-stablelists-0:5.14.0-70.105.1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-aarch64-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-s390x-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-doc-0:5.14.0-70.105.1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-core-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-devel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-modules-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.src",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-abi-stablelists-0:5.14.0-70.105.1.el9_0.noarch",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-aarch64-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-s390x-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-doc-0:5.14.0-70.105.1.el9_0.noarch",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-core-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-devel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-modules-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.src",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-abi-stablelists-0:5.14.0-70.105.1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-aarch64-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-s390x-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-doc-0:5.14.0-70.105.1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-core-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-devel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-modules-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.src",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-abi-stablelists-0:5.14.0-70.105.1.el9_0.noarch",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-aarch64-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-s390x-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-doc-0:5.14.0-70.105.1.el9_0.noarch",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-core-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-devel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-modules-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: smb: client: fix potential OOBs in smb2_parse_contexts()"
},
{
"cve": "CVE-2024-0193",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2023-12-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2255653"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the netfilter subsystem of the Linux kernel. If the catchall element is garbage-collected when the pipapo set is removed, the element can be deactivated twice. This can cause a use-after-free issue on an NFT_CHAIN object or NFT_OBJECT object, allowing a local unprivileged user with CAP_NET_ADMIN capability to escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: netfilter: use-after-free in nft_trans_gc_catchall_sync leads to privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The upstream commit that introduced this flaw (5f68718b34a5 \"netfilter: nf_tables: GC transaction API to avoid race with control plane\") is not included in any shipped kernel releases of Red Hat Enterprise Linux 6, 7, and 8.\n\nOnly local users with `CAP_NET_ADMIN` capability or root can trigger this issue. \nOn Red Hat Enterprise Linux, local unprivileged users can exploit unprivileged user namespaces (CONFIG_USER_NS) to grant themselves this capability.\n\nThe OpenShift Container Platform (OCP) control planes or master machines are based on Red Hat Enterprise Linux CoreOS (RHCOS) that consists primarily of RHEL components, therefore, it is also affected by this kernel vulnerability. A successful exploit needs necessary privileges (CAP_NET_ADMIN) and direct, local access. A local user in RHCOS is already a root with full permissions, hence existence of this vulnerability does not bring any value from the potential attacker perspective. From the OpenShift containers perspective, this vulnerability cannot be exploited as in OpenShift the cluster processes on the node are namespaced, which means that switching the namespace in the running OpenShift container will not bring necessary capabilities.\nThis means that for OpenShift, the impact of this vulnerability is Low.\n\nSimilar to the CVE-2023-32233 vulnerability, this has been explained in the following blog post as an example of a \"Container escape vulnerability\":\nhttps://www.redhat.com/en/blog/containers-vulnerability-risk-assessment",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.src",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-abi-stablelists-0:5.14.0-70.105.1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-aarch64-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-s390x-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-doc-0:5.14.0-70.105.1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-core-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-devel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-modules-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.src",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-abi-stablelists-0:5.14.0-70.105.1.el9_0.noarch",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-aarch64-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-s390x-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-doc-0:5.14.0-70.105.1.el9_0.noarch",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-core-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-devel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-modules-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-0193"
},
{
"category": "external",
"summary": "RHBZ#2255653",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255653"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-0193",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0193"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0193",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0193"
}
],
"release_date": "2024-01-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-07-09T09:24:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.src",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-abi-stablelists-0:5.14.0-70.105.1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-aarch64-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-s390x-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-doc-0:5.14.0-70.105.1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-core-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-devel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-modules-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.src",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-abi-stablelists-0:5.14.0-70.105.1.el9_0.noarch",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-aarch64-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-s390x-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-doc-0:5.14.0-70.105.1.el9_0.noarch",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-core-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-devel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-modules-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:4415"
},
{
"category": "workaround",
"details": "In order to trigger the issue, it requires the ability to create user/net namespaces.\n\nOn non-containerized deployments of Red Hat Enterprise Linux 8, you can disable user namespaces by setting user.max_user_namespaces to 0:\n\n# echo \"user.max_user_namespaces=0\" \u003e /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf\n\nOn containerized deployments, such as Red Hat OpenShift Container Platform, do not use this mitigation as the functionality is needed to be enabled.",
"product_ids": [
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.src",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-abi-stablelists-0:5.14.0-70.105.1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-aarch64-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-s390x-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-doc-0:5.14.0-70.105.1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-core-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-devel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-modules-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.src",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-abi-stablelists-0:5.14.0-70.105.1.el9_0.noarch",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-aarch64-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-s390x-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-doc-0:5.14.0-70.105.1.el9_0.noarch",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-core-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-devel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-modules-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.src",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-abi-stablelists-0:5.14.0-70.105.1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-aarch64-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-s390x-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-doc-0:5.14.0-70.105.1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-core-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-devel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-modules-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.src",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-abi-stablelists-0:5.14.0-70.105.1.el9_0.noarch",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-aarch64-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-s390x-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-doc-0:5.14.0-70.105.1.el9_0.noarch",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-core-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-devel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-modules-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: netfilter: use-after-free in nft_trans_gc_catchall_sync leads to privilege escalation"
},
{
"cve": "CVE-2024-26598",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2024-02-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2265801"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel pertaining to a potential use-after-free (UAF) scenario in a system involving Logical Partitioning Interrupts (LPI) translation cache operations. Specifically, the issue arises when a cache hit occurs concurrently with an operation that invalidates the cache, such as a DISCARD ITS command. The root cause is traced to vgic_its_check_cache() not appropriately managing the reference count of the vgic_irq object. Upon returning from this function, the reference count of vgic_irq is not incremented. This issue can lead to the object being prematurely freed while still in use by other parts of the system, potentially resulting in undefined behavior or system instability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: kvm: Avoid potential UAF in LPI translation cache",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The vulnerability is assessed as having a Moderate severity due to its potential to cause system instability or undefined behavior under specific conditions. Specifically, the issue arises from concurrent operations involving the LPI translation cache and commands that invalidate this cache, such as DISCARD ITS commands. The root cause lies in vgic_its_check_cache() failing to increment the reference count of the vgic_irq object before releasing the lock. This oversight can lead to a use-after-free scenario where the object may be prematurely freed while still in use elsewhere in the system. As a consequence, if the object is accessed or modified after being freed, it can result in unpredictable behavior, crashes, or even security vulnerabilities if an attacker can control the timing of cache invalidation and subsequent accesses.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.src",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-abi-stablelists-0:5.14.0-70.105.1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-aarch64-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-s390x-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-doc-0:5.14.0-70.105.1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-core-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-devel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-modules-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.src",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-abi-stablelists-0:5.14.0-70.105.1.el9_0.noarch",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-aarch64-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-s390x-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-doc-0:5.14.0-70.105.1.el9_0.noarch",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-core-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-devel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-modules-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-26598"
},
{
"category": "external",
"summary": "RHBZ#2265801",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265801"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-26598",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26598"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-26598",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26598"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024022338-CVE-2024-26598-24f4@gregkh/T/#u",
"url": "https://lore.kernel.org/linux-cve-announce/2024022338-CVE-2024-26598-24f4@gregkh/T/#u"
}
],
"release_date": "2024-02-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-07-09T09:24:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.src",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-abi-stablelists-0:5.14.0-70.105.1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-aarch64-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-s390x-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-doc-0:5.14.0-70.105.1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-core-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-devel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-modules-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.src",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-abi-stablelists-0:5.14.0-70.105.1.el9_0.noarch",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-aarch64-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-s390x-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-doc-0:5.14.0-70.105.1.el9_0.noarch",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-core-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-devel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-modules-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:4415"
},
{
"category": "workaround",
"details": "No mitigation is currently available for this vulnerability. Make sure to perform the updates as they become available.",
"product_ids": [
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.src",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-abi-stablelists-0:5.14.0-70.105.1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-aarch64-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-s390x-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-doc-0:5.14.0-70.105.1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-core-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-devel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-modules-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.src",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-abi-stablelists-0:5.14.0-70.105.1.el9_0.noarch",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-aarch64-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-s390x-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-doc-0:5.14.0-70.105.1.el9_0.noarch",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-core-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-devel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-modules-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.src",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-abi-stablelists-0:5.14.0-70.105.1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-aarch64-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-s390x-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-doc-0:5.14.0-70.105.1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-core-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-devel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-modules-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.src",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-abi-stablelists-0:5.14.0-70.105.1.el9_0.noarch",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-aarch64-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-s390x-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-doc-0:5.14.0-70.105.1.el9_0.noarch",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-core-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-devel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-modules-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: kvm: Avoid potential UAF in LPI translation cache"
},
{
"cve": "CVE-2024-26673",
"cwe": {
"id": "CWE-99",
"name": "Improper Control of Resource Identifiers (\u0027Resource Injection\u0027)"
},
"discovery_date": "2024-04-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2272816"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations\n\n- Disallow families other than NFPROTO_{IPV4,IPV6,INET}.\n- Disallow layer 4 protocol with no ports, since destination port is a\n mandatory attribute for this object.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: netfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.src",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-abi-stablelists-0:5.14.0-70.105.1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-aarch64-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-s390x-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-doc-0:5.14.0-70.105.1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-core-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-devel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-modules-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.src",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-abi-stablelists-0:5.14.0-70.105.1.el9_0.noarch",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-aarch64-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-s390x-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-doc-0:5.14.0-70.105.1.el9_0.noarch",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-core-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-devel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-modules-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-26673"
},
{
"category": "external",
"summary": "RHBZ#2272816",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272816"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-26673",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26673"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-26673",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26673"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024040212-CVE-2024-26673-b2d3@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024040212-CVE-2024-26673-b2d3@gregkh/T"
}
],
"release_date": "2024-04-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-07-09T09:24:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.src",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-abi-stablelists-0:5.14.0-70.105.1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-aarch64-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-s390x-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-doc-0:5.14.0-70.105.1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-core-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-devel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-modules-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.src",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-abi-stablelists-0:5.14.0-70.105.1.el9_0.noarch",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-aarch64-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-s390x-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-doc-0:5.14.0-70.105.1.el9_0.noarch",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-core-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-devel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-modules-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:4415"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.src",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-abi-stablelists-0:5.14.0-70.105.1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-aarch64-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-s390x-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-doc-0:5.14.0-70.105.1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-core-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-devel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-modules-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.src",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-abi-stablelists-0:5.14.0-70.105.1.el9_0.noarch",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-aarch64-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-s390x-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-doc-0:5.14.0-70.105.1.el9_0.noarch",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-core-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-devel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-modules-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: netfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations"
},
{
"cve": "CVE-2024-35890",
"discovery_date": "2024-05-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2281689"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u0027s Generic Receive Offload (GRO) feature, where packets processed with a fragment list are not properly orphaned due to incorrect handling of socket references. This vulnerability can cause system instability or kernel bugs. The issue has been fixed by making sure that socket references are correctly removed during packet processing. Users should update their kernel to the patched version to mitigate this risk.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: gro: fix ownership transfer",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.src",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-abi-stablelists-0:5.14.0-70.105.1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-aarch64-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-s390x-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-doc-0:5.14.0-70.105.1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-core-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-devel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-modules-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.src",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-abi-stablelists-0:5.14.0-70.105.1.el9_0.noarch",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-aarch64-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-s390x-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-doc-0:5.14.0-70.105.1.el9_0.noarch",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-core-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-devel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-modules-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-35890"
},
{
"category": "external",
"summary": "RHBZ#2281689",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2281689"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-35890",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35890"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-35890",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-35890"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024051948-CVE-2024-35890-beaa@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024051948-CVE-2024-35890-beaa@gregkh/T"
}
],
"release_date": "2024-05-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-07-09T09:24:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.src",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-abi-stablelists-0:5.14.0-70.105.1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-aarch64-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-s390x-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-doc-0:5.14.0-70.105.1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-core-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-devel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-modules-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.src",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-abi-stablelists-0:5.14.0-70.105.1.el9_0.noarch",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-aarch64-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-s390x-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-doc-0:5.14.0-70.105.1.el9_0.noarch",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-core-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-devel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-modules-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:4415"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.src",
"AppStream-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-abi-stablelists-0:5.14.0-70.105.1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-aarch64-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-s390x-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-doc-0:5.14.0-70.105.1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-core-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-devel-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-modules-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:kernel-zfcpdump-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:bpftool-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:bpftool-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.src",
"BaseOS-9.0.0.Z.E4S:kernel-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-abi-stablelists-0:5.14.0-70.105.1.el9_0.noarch",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-core-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-core-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debug-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-aarch64-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-s390x-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-devel-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-devel-matched-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-doc-0:5.14.0-70.105.1.el9_0.noarch",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-headers-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-modules-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-modules-extra-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-tools-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-tools-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:kernel-tools-libs-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-core-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-devel-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-devel-matched-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-modules-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:kernel-zfcpdump-modules-extra-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:perf-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:python3-perf-0:5.14.0-70.105.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.s390x",
"BaseOS-9.0.0.Z.E4S:python3-perf-debuginfo-0:5.14.0-70.105.1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: gro: fix ownership transfer"
}
]
}
RHSA-2024_8161
Vulnerability from csaf_redhat - Published: 2024-10-16 00:36 - Updated: 2024-12-11 16:41Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions, and Red Hat Enterprise Linux 8.6 Telecommunications Update Service.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: kvm: Avoid potential UAF in LPI translation cache (CVE-2024-26598)\n\n* kernel: i40e: Do not allow untrusted VF to remove administratively set MAC (CVE-2024-26830)\n\n* kernel: udp: do not accept non-tunnel GSO skbs landing in a tunnel (CVE-2024-35884)\n\n* kernel: mlxsw: spectrum: Protect driver from buggy firmware (CVE-2021-47560)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:8161",
"url": "https://access.redhat.com/errata/RHSA-2024:8161"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2265801",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265801"
},
{
"category": "external",
"summary": "2275596",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2275596"
},
{
"category": "external",
"summary": "2281704",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2281704"
},
{
"category": "external",
"summary": "2283389",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2283389"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_8161.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2024-12-11T16:41:53+00:00",
"generator": {
"date": "2024-12-11T16:41:53+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.3"
}
},
"id": "RHSA-2024:8161",
"initial_release_date": "2024-10-16T00:36:58+00:00",
"revision_history": [
{
"date": "2024-10-16T00:36:58+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-10-16T00:36:58+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-11T16:41:53+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:8.6::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:8.6::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:8.6::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-372.126.1.el8_6.x86_64",
"product": {
"name": "bpftool-0:4.18.0-372.126.1.el8_6.x86_64",
"product_id": "bpftool-0:4.18.0-372.126.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-372.126.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-372.126.1.el8_6.x86_64",
"product": {
"name": "kernel-0:4.18.0-372.126.1.el8_6.x86_64",
"product_id": "kernel-0:4.18.0-372.126.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-372.126.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-372.126.1.el8_6.x86_64",
"product": {
"name": "kernel-core-0:4.18.0-372.126.1.el8_6.x86_64",
"product_id": "kernel-core-0:4.18.0-372.126.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-372.126.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"product_id": "kernel-cross-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-372.126.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-372.126.1.el8_6.x86_64",
"product": {
"name": "kernel-debug-0:4.18.0-372.126.1.el8_6.x86_64",
"product_id": "kernel-debug-0:4.18.0-372.126.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-372.126.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-372.126.1.el8_6.x86_64",
"product": {
"name": "kernel-debug-core-0:4.18.0-372.126.1.el8_6.x86_64",
"product_id": "kernel-debug-core-0:4.18.0-372.126.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-372.126.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"product_id": "kernel-debug-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-372.126.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"product_id": "kernel-debug-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-372.126.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-372.126.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"product": {
"name": "kernel-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"product_id": "kernel-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-372.126.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"product": {
"name": "kernel-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"product_id": "kernel-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-372.126.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"product": {
"name": "kernel-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"product_id": "kernel-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-372.126.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"product_id": "kernel-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-372.126.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-372.126.1.el8_6.x86_64",
"product": {
"name": "kernel-tools-0:4.18.0-372.126.1.el8_6.x86_64",
"product_id": "kernel-tools-0:4.18.0-372.126.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-372.126.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-372.126.1.el8_6.x86_64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-372.126.1.el8_6.x86_64",
"product_id": "kernel-tools-libs-0:4.18.0-372.126.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-372.126.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-372.126.1.el8_6.x86_64",
"product": {
"name": "perf-0:4.18.0-372.126.1.el8_6.x86_64",
"product_id": "perf-0:4.18.0-372.126.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-372.126.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-372.126.1.el8_6.x86_64",
"product": {
"name": "python3-perf-0:4.18.0-372.126.1.el8_6.x86_64",
"product_id": "python3-perf-0:4.18.0-372.126.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-372.126.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"product_id": "bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-372.126.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-372.126.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"product_id": "kernel-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-372.126.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-372.126.1.el8_6.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-372.126.1.el8_6.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-372.126.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-372.126.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-372.126.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"product": {
"name": "perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"product_id": "perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-372.126.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"product_id": "python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-372.126.1.el8_6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:4.18.0-372.126.1.el8_6.src",
"product": {
"name": "kernel-0:4.18.0-372.126.1.el8_6.src",
"product_id": "kernel-0:4.18.0-372.126.1.el8_6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-372.126.1.el8_6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-stablelists-0:4.18.0-372.126.1.el8_6.noarch",
"product": {
"name": "kernel-abi-stablelists-0:4.18.0-372.126.1.el8_6.noarch",
"product_id": "kernel-abi-stablelists-0:4.18.0-372.126.1.el8_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-stablelists@4.18.0-372.126.1.el8_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:4.18.0-372.126.1.el8_6.noarch",
"product": {
"name": "kernel-doc-0:4.18.0-372.126.1.el8_6.noarch",
"product_id": "kernel-doc-0:4.18.0-372.126.1.el8_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@4.18.0-372.126.1.el8_6?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-372.126.1.el8_6.aarch64",
"product": {
"name": "bpftool-0:4.18.0-372.126.1.el8_6.aarch64",
"product_id": "bpftool-0:4.18.0-372.126.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-372.126.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-372.126.1.el8_6.aarch64",
"product": {
"name": "kernel-0:4.18.0-372.126.1.el8_6.aarch64",
"product_id": "kernel-0:4.18.0-372.126.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-372.126.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-372.126.1.el8_6.aarch64",
"product": {
"name": "kernel-core-0:4.18.0-372.126.1.el8_6.aarch64",
"product_id": "kernel-core-0:4.18.0-372.126.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-372.126.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-372.126.1.el8_6.aarch64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-372.126.1.el8_6.aarch64",
"product_id": "kernel-cross-headers-0:4.18.0-372.126.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-372.126.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-372.126.1.el8_6.aarch64",
"product": {
"name": "kernel-debug-0:4.18.0-372.126.1.el8_6.aarch64",
"product_id": "kernel-debug-0:4.18.0-372.126.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-372.126.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-372.126.1.el8_6.aarch64",
"product": {
"name": "kernel-debug-core-0:4.18.0-372.126.1.el8_6.aarch64",
"product_id": "kernel-debug-core-0:4.18.0-372.126.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-372.126.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-372.126.1.el8_6.aarch64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-372.126.1.el8_6.aarch64",
"product_id": "kernel-debug-devel-0:4.18.0-372.126.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-372.126.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-372.126.1.el8_6.aarch64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-372.126.1.el8_6.aarch64",
"product_id": "kernel-debug-modules-0:4.18.0-372.126.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-372.126.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.aarch64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.aarch64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-372.126.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-372.126.1.el8_6.aarch64",
"product": {
"name": "kernel-devel-0:4.18.0-372.126.1.el8_6.aarch64",
"product_id": "kernel-devel-0:4.18.0-372.126.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-372.126.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-372.126.1.el8_6.aarch64",
"product": {
"name": "kernel-headers-0:4.18.0-372.126.1.el8_6.aarch64",
"product_id": "kernel-headers-0:4.18.0-372.126.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-372.126.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-372.126.1.el8_6.aarch64",
"product": {
"name": "kernel-modules-0:4.18.0-372.126.1.el8_6.aarch64",
"product_id": "kernel-modules-0:4.18.0-372.126.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-372.126.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-372.126.1.el8_6.aarch64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-372.126.1.el8_6.aarch64",
"product_id": "kernel-modules-extra-0:4.18.0-372.126.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-372.126.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-372.126.1.el8_6.aarch64",
"product": {
"name": "kernel-tools-0:4.18.0-372.126.1.el8_6.aarch64",
"product_id": "kernel-tools-0:4.18.0-372.126.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-372.126.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-372.126.1.el8_6.aarch64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-372.126.1.el8_6.aarch64",
"product_id": "kernel-tools-libs-0:4.18.0-372.126.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-372.126.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-372.126.1.el8_6.aarch64",
"product": {
"name": "perf-0:4.18.0-372.126.1.el8_6.aarch64",
"product_id": "perf-0:4.18.0-372.126.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-372.126.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-372.126.1.el8_6.aarch64",
"product": {
"name": "python3-perf-0:4.18.0-372.126.1.el8_6.aarch64",
"product_id": "python3-perf-0:4.18.0-372.126.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-372.126.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"product_id": "bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-372.126.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-372.126.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"product_id": "kernel-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-372.126.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-372.126.1.el8_6.aarch64",
"product": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-372.126.1.el8_6.aarch64",
"product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-372.126.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-372.126.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-372.126.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"product": {
"name": "perf-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"product_id": "perf-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-372.126.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"product_id": "python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-372.126.1.el8_6?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-372.126.1.el8_6.ppc64le",
"product": {
"name": "bpftool-0:4.18.0-372.126.1.el8_6.ppc64le",
"product_id": "bpftool-0:4.18.0-372.126.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-372.126.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-372.126.1.el8_6.ppc64le",
"product": {
"name": "kernel-0:4.18.0-372.126.1.el8_6.ppc64le",
"product_id": "kernel-0:4.18.0-372.126.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-372.126.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-372.126.1.el8_6.ppc64le",
"product": {
"name": "kernel-core-0:4.18.0-372.126.1.el8_6.ppc64le",
"product_id": "kernel-core-0:4.18.0-372.126.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-372.126.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-372.126.1.el8_6.ppc64le",
"product": {
"name": "kernel-cross-headers-0:4.18.0-372.126.1.el8_6.ppc64le",
"product_id": "kernel-cross-headers-0:4.18.0-372.126.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-372.126.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-372.126.1.el8_6.ppc64le",
"product": {
"name": "kernel-debug-0:4.18.0-372.126.1.el8_6.ppc64le",
"product_id": "kernel-debug-0:4.18.0-372.126.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-372.126.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-372.126.1.el8_6.ppc64le",
"product": {
"name": "kernel-debug-core-0:4.18.0-372.126.1.el8_6.ppc64le",
"product_id": "kernel-debug-core-0:4.18.0-372.126.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-372.126.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-372.126.1.el8_6.ppc64le",
"product": {
"name": "kernel-debug-devel-0:4.18.0-372.126.1.el8_6.ppc64le",
"product_id": "kernel-debug-devel-0:4.18.0-372.126.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-372.126.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-372.126.1.el8_6.ppc64le",
"product": {
"name": "kernel-debug-modules-0:4.18.0-372.126.1.el8_6.ppc64le",
"product_id": "kernel-debug-modules-0:4.18.0-372.126.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-372.126.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.ppc64le",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.ppc64le",
"product_id": "kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-372.126.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-372.126.1.el8_6.ppc64le",
"product": {
"name": "kernel-devel-0:4.18.0-372.126.1.el8_6.ppc64le",
"product_id": "kernel-devel-0:4.18.0-372.126.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-372.126.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-372.126.1.el8_6.ppc64le",
"product": {
"name": "kernel-headers-0:4.18.0-372.126.1.el8_6.ppc64le",
"product_id": "kernel-headers-0:4.18.0-372.126.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-372.126.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-372.126.1.el8_6.ppc64le",
"product": {
"name": "kernel-modules-0:4.18.0-372.126.1.el8_6.ppc64le",
"product_id": "kernel-modules-0:4.18.0-372.126.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-372.126.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-372.126.1.el8_6.ppc64le",
"product": {
"name": "kernel-modules-extra-0:4.18.0-372.126.1.el8_6.ppc64le",
"product_id": "kernel-modules-extra-0:4.18.0-372.126.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-372.126.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-372.126.1.el8_6.ppc64le",
"product": {
"name": "kernel-tools-0:4.18.0-372.126.1.el8_6.ppc64le",
"product_id": "kernel-tools-0:4.18.0-372.126.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-372.126.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-372.126.1.el8_6.ppc64le",
"product": {
"name": "kernel-tools-libs-0:4.18.0-372.126.1.el8_6.ppc64le",
"product_id": "kernel-tools-libs-0:4.18.0-372.126.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-372.126.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-372.126.1.el8_6.ppc64le",
"product": {
"name": "perf-0:4.18.0-372.126.1.el8_6.ppc64le",
"product_id": "perf-0:4.18.0-372.126.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-372.126.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-372.126.1.el8_6.ppc64le",
"product": {
"name": "python3-perf-0:4.18.0-372.126.1.el8_6.ppc64le",
"product_id": "python3-perf-0:4.18.0-372.126.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-372.126.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"product_id": "bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-372.126.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"product_id": "kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-372.126.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"product": {
"name": "kernel-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"product_id": "kernel-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-372.126.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.126.1.el8_6.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.126.1.el8_6.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.126.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-372.126.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"product_id": "kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-372.126.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"product": {
"name": "perf-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"product_id": "perf-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-372.126.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"product_id": "python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-372.126.1.el8_6?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-372.126.1.el8_6.s390x",
"product": {
"name": "bpftool-0:4.18.0-372.126.1.el8_6.s390x",
"product_id": "bpftool-0:4.18.0-372.126.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-372.126.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-372.126.1.el8_6.s390x",
"product": {
"name": "kernel-0:4.18.0-372.126.1.el8_6.s390x",
"product_id": "kernel-0:4.18.0-372.126.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-372.126.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-372.126.1.el8_6.s390x",
"product": {
"name": "kernel-core-0:4.18.0-372.126.1.el8_6.s390x",
"product_id": "kernel-core-0:4.18.0-372.126.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-372.126.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-372.126.1.el8_6.s390x",
"product": {
"name": "kernel-cross-headers-0:4.18.0-372.126.1.el8_6.s390x",
"product_id": "kernel-cross-headers-0:4.18.0-372.126.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-372.126.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-372.126.1.el8_6.s390x",
"product": {
"name": "kernel-debug-0:4.18.0-372.126.1.el8_6.s390x",
"product_id": "kernel-debug-0:4.18.0-372.126.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-372.126.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-372.126.1.el8_6.s390x",
"product": {
"name": "kernel-debug-core-0:4.18.0-372.126.1.el8_6.s390x",
"product_id": "kernel-debug-core-0:4.18.0-372.126.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-372.126.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-372.126.1.el8_6.s390x",
"product": {
"name": "kernel-debug-devel-0:4.18.0-372.126.1.el8_6.s390x",
"product_id": "kernel-debug-devel-0:4.18.0-372.126.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-372.126.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-372.126.1.el8_6.s390x",
"product": {
"name": "kernel-debug-modules-0:4.18.0-372.126.1.el8_6.s390x",
"product_id": "kernel-debug-modules-0:4.18.0-372.126.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-372.126.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.s390x",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.s390x",
"product_id": "kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-372.126.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-372.126.1.el8_6.s390x",
"product": {
"name": "kernel-devel-0:4.18.0-372.126.1.el8_6.s390x",
"product_id": "kernel-devel-0:4.18.0-372.126.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-372.126.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-372.126.1.el8_6.s390x",
"product": {
"name": "kernel-headers-0:4.18.0-372.126.1.el8_6.s390x",
"product_id": "kernel-headers-0:4.18.0-372.126.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-372.126.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-372.126.1.el8_6.s390x",
"product": {
"name": "kernel-modules-0:4.18.0-372.126.1.el8_6.s390x",
"product_id": "kernel-modules-0:4.18.0-372.126.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-372.126.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-372.126.1.el8_6.s390x",
"product": {
"name": "kernel-modules-extra-0:4.18.0-372.126.1.el8_6.s390x",
"product_id": "kernel-modules-extra-0:4.18.0-372.126.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-372.126.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-372.126.1.el8_6.s390x",
"product": {
"name": "kernel-tools-0:4.18.0-372.126.1.el8_6.s390x",
"product_id": "kernel-tools-0:4.18.0-372.126.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-372.126.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-0:4.18.0-372.126.1.el8_6.s390x",
"product": {
"name": "kernel-zfcpdump-0:4.18.0-372.126.1.el8_6.s390x",
"product_id": "kernel-zfcpdump-0:4.18.0-372.126.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-372.126.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-core-0:4.18.0-372.126.1.el8_6.s390x",
"product": {
"name": "kernel-zfcpdump-core-0:4.18.0-372.126.1.el8_6.s390x",
"product_id": "kernel-zfcpdump-core-0:4.18.0-372.126.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-372.126.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-0:4.18.0-372.126.1.el8_6.s390x",
"product": {
"name": "kernel-zfcpdump-devel-0:4.18.0-372.126.1.el8_6.s390x",
"product_id": "kernel-zfcpdump-devel-0:4.18.0-372.126.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-372.126.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-0:4.18.0-372.126.1.el8_6.s390x",
"product": {
"name": "kernel-zfcpdump-modules-0:4.18.0-372.126.1.el8_6.s390x",
"product_id": "kernel-zfcpdump-modules-0:4.18.0-372.126.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-372.126.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-372.126.1.el8_6.s390x",
"product": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-372.126.1.el8_6.s390x",
"product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-372.126.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-372.126.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-372.126.1.el8_6.s390x",
"product": {
"name": "perf-0:4.18.0-372.126.1.el8_6.s390x",
"product_id": "perf-0:4.18.0-372.126.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-372.126.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-372.126.1.el8_6.s390x",
"product": {
"name": "python3-perf-0:4.18.0-372.126.1.el8_6.s390x",
"product_id": "python3-perf-0:4.18.0-372.126.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-372.126.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"product_id": "bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-372.126.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"product_id": "kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-372.126.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"product": {
"name": "kernel-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"product_id": "kernel-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-372.126.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:4.18.0-372.126.1.el8_6.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-372.126.1.el8_6.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:4.18.0-372.126.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-372.126.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"product_id": "kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-372.126.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"product": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-372.126.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"product": {
"name": "perf-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"product_id": "perf-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-372.126.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"product_id": "python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-372.126.1.el8_6?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:bpftool-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "bpftool-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.126.1.el8_6.src as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.126.1.el8_6.src"
},
"product_reference": "kernel-0:4.18.0-372.126.1.el8_6.src",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "kernel-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:4.18.0-372.126.1.el8_6.noarch as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:kernel-abi-stablelists-0:4.18.0-372.126.1.el8_6.noarch"
},
"product_reference": "kernel-abi-stablelists-0:4.18.0-372.126.1.el8_6.noarch",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:kernel-core-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:kernel-debug-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:kernel-debug-core-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:kernel-devel-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-372.126.1.el8_6.noarch as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:kernel-doc-0:4.18.0-372.126.1.el8_6.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-372.126.1.el8_6.noarch",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:kernel-headers-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:kernel-modules-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:kernel-tools-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:perf-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "perf-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:python3-perf-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.126.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.aarch64"
},
"product_reference": "bpftool-0:4.18.0-372.126.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.126.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-372.126.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.126.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.s390x"
},
"product_reference": "bpftool-0:4.18.0-372.126.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "bpftool-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.126.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.aarch64"
},
"product_reference": "kernel-0:4.18.0-372.126.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.126.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.ppc64le"
},
"product_reference": "kernel-0:4.18.0-372.126.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.126.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.s390x"
},
"product_reference": "kernel-0:4.18.0-372.126.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.126.1.el8_6.src as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.src"
},
"product_reference": "kernel-0:4.18.0-372.126.1.el8_6.src",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "kernel-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:4.18.0-372.126.1.el8_6.noarch as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-abi-stablelists-0:4.18.0-372.126.1.el8_6.noarch"
},
"product_reference": "kernel-abi-stablelists-0:4.18.0-372.126.1.el8_6.noarch",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.126.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-372.126.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.126.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-372.126.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.126.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.s390x"
},
"product_reference": "kernel-core-0:4.18.0-372.126.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.126.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.126.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.126.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.126.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.126.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.126.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.126.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-372.126.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.126.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-372.126.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.126.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-372.126.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.126.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.126.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.126.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.126.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.126.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.126.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.126.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.126.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.126.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.126.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.126.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.126.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.126.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.126.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.126.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.126.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.126.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.126.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.126.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-372.126.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-aarch64-0:4.18.0-372.126.1.el8_6.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-372.126.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.126.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-372.126.1.el8_6.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.126.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-372.126.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-s390x-0:4.18.0-372.126.1.el8_6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-372.126.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.126.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-372.126.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.126.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-372.126.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.126.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-372.126.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-372.126.1.el8_6.noarch as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-doc-0:4.18.0-372.126.1.el8_6.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-372.126.1.el8_6.noarch",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.126.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-372.126.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.126.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-372.126.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.126.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-372.126.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.126.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-372.126.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.126.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-372.126.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.126.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-372.126.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.126.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.126.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.126.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.126.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.126.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.126.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.126.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-372.126.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.126.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-372.126.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.126.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-372.126.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-372.126.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-372.126.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-372.126.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-372.126.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-372.126.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-0:4.18.0-372.126.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-372.126.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-372.126.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-core-0:4.18.0-372.126.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-372.126.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-372.126.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-debuginfo-0:4.18.0-372.126.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-372.126.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-devel-0:4.18.0-372.126.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-372.126.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-372.126.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-0:4.18.0-372.126.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-372.126.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-372.126.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-extra-0:4.18.0-372.126.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-372.126.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.126.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.aarch64"
},
"product_reference": "perf-0:4.18.0-372.126.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.126.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.ppc64le"
},
"product_reference": "perf-0:4.18.0-372.126.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.126.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.s390x"
},
"product_reference": "perf-0:4.18.0-372.126.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "perf-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.126.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.126.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-372.126.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.126.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-372.126.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.126.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.s390x"
},
"product_reference": "python3-perf-0:4.18.0-372.126.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:bpftool-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "bpftool-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.126.1.el8_6.src as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.126.1.el8_6.src"
},
"product_reference": "kernel-0:4.18.0-372.126.1.el8_6.src",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "kernel-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:4.18.0-372.126.1.el8_6.noarch as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:kernel-abi-stablelists-0:4.18.0-372.126.1.el8_6.noarch"
},
"product_reference": "kernel-abi-stablelists-0:4.18.0-372.126.1.el8_6.noarch",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:kernel-core-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:kernel-debug-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:kernel-debug-core-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:kernel-devel-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-372.126.1.el8_6.noarch as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:kernel-doc-0:4.18.0-372.126.1.el8_6.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-372.126.1.el8_6.noarch",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:kernel-headers-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:kernel-modules-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:kernel-tools-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:perf-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "perf-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:python3-perf-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-47560",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2024-05-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2283389"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the Linux kernel\u0027s mlxsw spectrum driver, where processing port up/down events leads to a NULL pointer dereference. This issue occurs when the driver fails to handle events for the CPU port, which exists but lacks a corresponding network device, resulting in system crashes.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: mlxsw: spectrum: Protect driver from buggy firmware",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.Z.AUS:bpftool-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.126.1.el8_6.src",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-abi-stablelists-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-doc-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.src",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-abi-stablelists-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-aarch64-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-s390x-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-doc-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-core-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-devel-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-extra-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.126.1.el8_6.src",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-abi-stablelists-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-doc-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47560"
},
{
"category": "external",
"summary": "RHBZ#2283389",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2283389"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47560",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47560"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47560",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47560"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052451-CVE-2021-47560-4a52@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052451-CVE-2021-47560-4a52@gregkh/T"
}
],
"release_date": "2024-05-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-10-16T00:36:58+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.Z.AUS:bpftool-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.126.1.el8_6.src",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-abi-stablelists-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-doc-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.src",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-abi-stablelists-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-aarch64-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-s390x-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-doc-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-core-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-devel-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-extra-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.126.1.el8_6.src",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-abi-stablelists-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-doc-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8161"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.6.0.Z.AUS:bpftool-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.126.1.el8_6.src",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-abi-stablelists-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-doc-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.src",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-abi-stablelists-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-aarch64-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-s390x-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-doc-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-core-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-devel-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-extra-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.126.1.el8_6.src",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-abi-stablelists-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-doc-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.Z.AUS:bpftool-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.126.1.el8_6.src",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-abi-stablelists-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-doc-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.src",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-abi-stablelists-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-aarch64-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-s390x-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-doc-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-core-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-devel-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-extra-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.126.1.el8_6.src",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-abi-stablelists-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-doc-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: mlxsw: spectrum: Protect driver from buggy firmware"
},
{
"cve": "CVE-2024-26598",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2024-02-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2265801"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel pertaining to a potential use-after-free (UAF) scenario in a system involving Logical Partitioning Interrupts (LPI) translation cache operations. Specifically, the issue arises when a cache hit occurs concurrently with an operation that invalidates the cache, such as a DISCARD ITS command. The root cause is traced to vgic_its_check_cache() not appropriately managing the reference count of the vgic_irq object. Upon returning from this function, the reference count of vgic_irq is not incremented. This issue can lead to the object being prematurely freed while still in use by other parts of the system, potentially resulting in undefined behavior or system instability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: kvm: Avoid potential UAF in LPI translation cache",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The vulnerability is assessed as having a Moderate severity due to its potential to cause system instability or undefined behavior under specific conditions. Specifically, the issue arises from concurrent operations involving the LPI translation cache and commands that invalidate this cache, such as DISCARD ITS commands. The root cause lies in vgic_its_check_cache() failing to increment the reference count of the vgic_irq object before releasing the lock. This oversight can lead to a use-after-free scenario where the object may be prematurely freed while still in use elsewhere in the system. As a consequence, if the object is accessed or modified after being freed, it can result in unpredictable behavior, crashes, or even security vulnerabilities if an attacker can control the timing of cache invalidation and subsequent accesses.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.Z.AUS:bpftool-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.126.1.el8_6.src",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-abi-stablelists-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-doc-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.src",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-abi-stablelists-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-aarch64-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-s390x-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-doc-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-core-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-devel-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-extra-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.126.1.el8_6.src",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-abi-stablelists-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-doc-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-26598"
},
{
"category": "external",
"summary": "RHBZ#2265801",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265801"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-26598",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26598"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-26598",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26598"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024022338-CVE-2024-26598-24f4@gregkh/T/#u",
"url": "https://lore.kernel.org/linux-cve-announce/2024022338-CVE-2024-26598-24f4@gregkh/T/#u"
}
],
"release_date": "2024-02-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-10-16T00:36:58+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.Z.AUS:bpftool-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.126.1.el8_6.src",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-abi-stablelists-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-doc-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.src",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-abi-stablelists-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-aarch64-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-s390x-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-doc-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-core-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-devel-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-extra-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.126.1.el8_6.src",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-abi-stablelists-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-doc-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8161"
},
{
"category": "workaround",
"details": "No mitigation is currently available for this vulnerability. Make sure to perform the updates as they become available.",
"product_ids": [
"BaseOS-8.6.0.Z.AUS:bpftool-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.126.1.el8_6.src",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-abi-stablelists-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-doc-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.src",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-abi-stablelists-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-aarch64-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-s390x-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-doc-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-core-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-devel-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-extra-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.126.1.el8_6.src",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-abi-stablelists-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-doc-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.Z.AUS:bpftool-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.126.1.el8_6.src",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-abi-stablelists-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-doc-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.src",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-abi-stablelists-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-aarch64-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-s390x-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-doc-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-core-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-devel-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-extra-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.126.1.el8_6.src",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-abi-stablelists-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-doc-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: kvm: Avoid potential UAF in LPI translation cache"
},
{
"cve": "CVE-2024-26830",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2024-04-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2275596"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Intel network adapters in the Linux kernel, where untrusted virtualized network interfaces can remove MAC addresses set by the system. This flaw allows an attacker with sufficient privileges to cause a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: i40e: Do not allow untrusted VF to remove administratively set MAC",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.Z.AUS:bpftool-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.126.1.el8_6.src",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-abi-stablelists-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-doc-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.src",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-abi-stablelists-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-aarch64-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-s390x-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-doc-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-core-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-devel-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-extra-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.126.1.el8_6.src",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-abi-stablelists-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-doc-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-26830"
},
{
"category": "external",
"summary": "RHBZ#2275596",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2275596"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-26830",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26830"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-26830",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26830"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024041703-CVE-2024-26830-5bc0@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024041703-CVE-2024-26830-5bc0@gregkh/T"
}
],
"release_date": "2024-04-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-10-16T00:36:58+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.Z.AUS:bpftool-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.126.1.el8_6.src",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-abi-stablelists-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-doc-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.src",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-abi-stablelists-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-aarch64-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-s390x-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-doc-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-core-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-devel-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-extra-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.126.1.el8_6.src",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-abi-stablelists-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-doc-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8161"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.Z.AUS:bpftool-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.126.1.el8_6.src",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-abi-stablelists-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-doc-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.src",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-abi-stablelists-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-aarch64-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-s390x-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-doc-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-core-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-devel-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-extra-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.126.1.el8_6.src",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-abi-stablelists-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-doc-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: i40e: Do not allow untrusted VF to remove administratively set MAC"
},
{
"cve": "CVE-2024-35884",
"discovery_date": "2024-05-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2281704"
}
],
"notes": [
{
"category": "description",
"text": "CVE-2024-35884 highlights a flaw in the Linux kernel\u0027s handling of UDP packets when Generic Receive Offload (GRO) forwarding is enabled. The issue occurs because non-tunnel UDP packets are sometimes mistakenly processed as if they belong to a tunnel. This can lead to data corruption or kernel crashes, particularly in environments with complex network configurations or when certain tunneling protocols like Geneve are used.\n\nThe kernel\u0027s processing logic for GRO and UDP packets fails to properly differentiate between tunneled and non-tunneled packets. As a result, improperly handled packets may lead to segmentation errors or system instability.\n\nThis vulnerability affects system availability and could result in crashes or data integrity issues during packet forwarding.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: udp: do not accept non-tunnel GSO skbs landing in a tunnel",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.Z.AUS:bpftool-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.126.1.el8_6.src",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-abi-stablelists-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-doc-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.src",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-abi-stablelists-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-aarch64-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-s390x-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-doc-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-core-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-devel-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-extra-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.126.1.el8_6.src",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-abi-stablelists-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-doc-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-35884"
},
{
"category": "external",
"summary": "RHBZ#2281704",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2281704"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-35884",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35884"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-35884",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-35884"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024051946-CVE-2024-35884-d4a4@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024051946-CVE-2024-35884-d4a4@gregkh/T"
}
],
"release_date": "2024-05-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-10-16T00:36:58+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.Z.AUS:bpftool-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.126.1.el8_6.src",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-abi-stablelists-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-doc-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.src",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-abi-stablelists-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-aarch64-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-s390x-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-doc-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-core-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-devel-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-extra-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.126.1.el8_6.src",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-abi-stablelists-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-doc-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8161"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.Z.AUS:bpftool-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.126.1.el8_6.src",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-abi-stablelists-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-doc-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.src",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-abi-stablelists-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-aarch64-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-s390x-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-doc-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-core-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-devel-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-extra-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.126.1.el8_6.src",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-abi-stablelists-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-cross-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-core-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-devel-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-doc-0:4.18.0-372.126.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-headers-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-extra-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-libs-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-0:4.18.0-372.126.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-372.126.1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: udp: do not accept non-tunnel GSO skbs landing in a tunnel"
}
]
}
RHSA-2024:3855
Vulnerability from csaf_redhat - Published: 2024-06-12 02:00 - Updated: 2025-11-21 19:04Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 9.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: KVM: SVM: improper check in svm_set_x2apic_msr_interception allows direct access to host x2apic msrs (CVE-2023-5090)\n\n* kernel: bluetooth: bt_sock_ioctl race condition leads to use-after-free in bt_sock_recvmsg (CVE-2023-51779)\n\n* kernel: kvm: Avoid potential UAF in LPI translation cache (CVE-2024-26598)\n\n* kernel: KVM: s390: vsie: fix race during shadow creation (CVE-2023-52639)\n\n* kernel: net/mlx5e: fix a potential double-free in fs_any_create_groups (CVE-2023-52667)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:3855",
"url": "https://access.redhat.com/errata/RHSA-2024:3855"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2248122",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2248122"
},
{
"category": "external",
"summary": "2256822",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256822"
},
{
"category": "external",
"summary": "2265801",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265801"
},
{
"category": "external",
"summary": "2273080",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2273080"
},
{
"category": "external",
"summary": "2281350",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2281350"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_3855.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2025-11-21T19:04:07+00:00",
"generator": {
"date": "2025-11-21T19:04:07+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2024:3855",
"initial_release_date": "2024-06-12T02:00:48+00:00",
"revision_history": [
{
"date": "2024-06-12T02:00:48+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-06-12T02:00:48+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T19:04:07+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:9.2::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:9.2::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product": {
"name": "Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:9.2::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"product": {
"name": "kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"product_id": "kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@5.14.0-284.69.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"product": {
"name": "kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"product_id": "kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@5.14.0-284.69.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"product": {
"name": "bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"product_id": "bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@7.0.0-284.69.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"product": {
"name": "kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"product_id": "kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-64k-debug-debuginfo@5.14.0-284.69.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"product": {
"name": "kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"product_id": "kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-64k-debuginfo@5.14.0-284.69.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"product": {
"name": "kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"product_id": "kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@5.14.0-284.69.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"product": {
"name": "kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"product_id": "kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@5.14.0-284.69.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"product": {
"name": "kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"product_id": "kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@5.14.0-284.69.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"product": {
"name": "kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"product_id": "kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@5.14.0-284.69.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"product": {
"name": "perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"product_id": "perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@5.14.0-284.69.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"product": {
"name": "python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"product_id": "python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@5.14.0-284.69.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"product": {
"name": "kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"product_id": "kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-64k-debug-devel@5.14.0-284.69.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"product": {
"name": "kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"product_id": "kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-64k-debug-devel-matched@5.14.0-284.69.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"product": {
"name": "kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"product_id": "kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-64k-devel@5.14.0-284.69.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"product": {
"name": "kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"product_id": "kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-64k-devel-matched@5.14.0-284.69.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"product": {
"name": "kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"product_id": "kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@5.14.0-284.69.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"product": {
"name": "kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"product_id": "kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel-matched@5.14.0-284.69.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"product": {
"name": "kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"product_id": "kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@5.14.0-284.69.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"product": {
"name": "kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"product_id": "kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel-matched@5.14.0-284.69.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"product": {
"name": "kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"product_id": "kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@5.14.0-284.69.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-0:5.14.0-284.69.1.el9_2.aarch64",
"product": {
"name": "perf-0:5.14.0-284.69.1.el9_2.aarch64",
"product_id": "perf-0:5.14.0-284.69.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@5.14.0-284.69.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"product": {
"name": "rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"product_id": "rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rtla@5.14.0-284.69.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"product": {
"name": "bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"product_id": "bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@7.0.0-284.69.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"product": {
"name": "kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"product_id": "kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@5.14.0-284.69.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"product": {
"name": "kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"product_id": "kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-64k@5.14.0-284.69.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"product": {
"name": "kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"product_id": "kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-64k-core@5.14.0-284.69.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"product": {
"name": "kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"product_id": "kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-64k-debug@5.14.0-284.69.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"product": {
"name": "kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"product_id": "kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-64k-debug-core@5.14.0-284.69.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"product": {
"name": "kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"product_id": "kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-64k-debug-modules@5.14.0-284.69.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"product": {
"name": "kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"product_id": "kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-64k-debug-modules-core@5.14.0-284.69.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"product": {
"name": "kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"product_id": "kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-64k-debug-modules-extra@5.14.0-284.69.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"product": {
"name": "kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"product_id": "kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-64k-modules@5.14.0-284.69.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"product": {
"name": "kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"product_id": "kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-64k-modules-core@5.14.0-284.69.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"product": {
"name": "kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"product_id": "kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-64k-modules-extra@5.14.0-284.69.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"product": {
"name": "kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"product_id": "kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@5.14.0-284.69.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"product": {
"name": "kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"product_id": "kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@5.14.0-284.69.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"product": {
"name": "kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"product_id": "kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@5.14.0-284.69.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"product": {
"name": "kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"product_id": "kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@5.14.0-284.69.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"product": {
"name": "kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"product_id": "kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-core@5.14.0-284.69.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"product": {
"name": "kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"product_id": "kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@5.14.0-284.69.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"product": {
"name": "kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"product_id": "kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@5.14.0-284.69.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"product": {
"name": "kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"product_id": "kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-core@5.14.0-284.69.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"product": {
"name": "kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"product_id": "kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@5.14.0-284.69.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"product": {
"name": "kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"product_id": "kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@5.14.0-284.69.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"product": {
"name": "kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"product_id": "kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@5.14.0-284.69.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"product": {
"name": "python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"product_id": "python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@5.14.0-284.69.1.el9_2?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"product": {
"name": "kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"product_id": "kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@5.14.0-284.69.1.el9_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"product_id": "kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@5.14.0-284.69.1.el9_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"product_id": "bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@7.0.0-284.69.1.el9_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"product_id": "kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@5.14.0-284.69.1.el9_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"product": {
"name": "kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"product_id": "kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@5.14.0-284.69.1.el9_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@5.14.0-284.69.1.el9_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"product_id": "kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@5.14.0-284.69.1.el9_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"product": {
"name": "perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"product_id": "perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@5.14.0-284.69.1.el9_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"product": {
"name": "python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"product_id": "python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@5.14.0-284.69.1.el9_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"product": {
"name": "kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"product_id": "kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@5.14.0-284.69.1.el9_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"product": {
"name": "kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"product_id": "kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel-matched@5.14.0-284.69.1.el9_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"product": {
"name": "kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"product_id": "kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@5.14.0-284.69.1.el9_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"product": {
"name": "kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"product_id": "kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel-matched@5.14.0-284.69.1.el9_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"product": {
"name": "kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"product_id": "kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@5.14.0-284.69.1.el9_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"product": {
"name": "perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"product_id": "perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@5.14.0-284.69.1.el9_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"product": {
"name": "rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"product_id": "rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rtla@5.14.0-284.69.1.el9_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"product": {
"name": "bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"product_id": "bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@7.0.0-284.69.1.el9_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"product": {
"name": "kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"product_id": "kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@5.14.0-284.69.1.el9_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"product": {
"name": "kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"product_id": "kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@5.14.0-284.69.1.el9_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"product": {
"name": "kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"product_id": "kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@5.14.0-284.69.1.el9_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"product": {
"name": "kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"product_id": "kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@5.14.0-284.69.1.el9_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"product": {
"name": "kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"product_id": "kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@5.14.0-284.69.1.el9_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"product": {
"name": "kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"product_id": "kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-core@5.14.0-284.69.1.el9_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"product": {
"name": "kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"product_id": "kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@5.14.0-284.69.1.el9_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"product": {
"name": "kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"product_id": "kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@5.14.0-284.69.1.el9_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"product": {
"name": "kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"product_id": "kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-core@5.14.0-284.69.1.el9_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"product": {
"name": "kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"product_id": "kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@5.14.0-284.69.1.el9_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"product": {
"name": "kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"product_id": "kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@5.14.0-284.69.1.el9_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"product": {
"name": "kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"product_id": "kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@5.14.0-284.69.1.el9_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"product": {
"name": "python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"product_id": "python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@5.14.0-284.69.1.el9_2?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"product": {
"name": "kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"product_id": "kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@5.14.0-284.69.1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"product_id": "kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@5.14.0-284.69.1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"product": {
"name": "bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"product_id": "bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@7.0.0-284.69.1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"product_id": "kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@5.14.0-284.69.1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"product": {
"name": "kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"product_id": "kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@5.14.0-284.69.1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@5.14.0-284.69.1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"product_id": "kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@5.14.0-284.69.1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"product": {
"name": "perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"product_id": "perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@5.14.0-284.69.1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"product_id": "python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@5.14.0-284.69.1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"product": {
"name": "kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"product_id": "kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@5.14.0-284.69.1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"product": {
"name": "kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"product_id": "kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel-matched@5.14.0-284.69.1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"product": {
"name": "kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"product_id": "kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@5.14.0-284.69.1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"product": {
"name": "kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"product_id": "kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel-matched@5.14.0-284.69.1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"product": {
"name": "kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"product_id": "kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@5.14.0-284.69.1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:5.14.0-284.69.1.el9_2.x86_64",
"product": {
"name": "perf-0:5.14.0-284.69.1.el9_2.x86_64",
"product_id": "perf-0:5.14.0-284.69.1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@5.14.0-284.69.1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rtla-0:5.14.0-284.69.1.el9_2.x86_64",
"product": {
"name": "rtla-0:5.14.0-284.69.1.el9_2.x86_64",
"product_id": "rtla-0:5.14.0-284.69.1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rtla@5.14.0-284.69.1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"product": {
"name": "bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"product_id": "bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@7.0.0-284.69.1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"product": {
"name": "kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"product_id": "kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@5.14.0-284.69.1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"product": {
"name": "kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"product_id": "kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@5.14.0-284.69.1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"product": {
"name": "kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"product_id": "kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@5.14.0-284.69.1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"product": {
"name": "kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"product_id": "kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@5.14.0-284.69.1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"product": {
"name": "kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"product_id": "kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@5.14.0-284.69.1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"product": {
"name": "kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"product_id": "kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-core@5.14.0-284.69.1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"product": {
"name": "kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"product_id": "kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@5.14.0-284.69.1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"product": {
"name": "kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"product_id": "kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-uki-virt@5.14.0-284.69.1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"product": {
"name": "kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"product_id": "kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@5.14.0-284.69.1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"product": {
"name": "kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"product_id": "kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-core@5.14.0-284.69.1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"product": {
"name": "kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"product_id": "kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@5.14.0-284.69.1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"product": {
"name": "kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"product_id": "kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@5.14.0-284.69.1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"product": {
"name": "kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"product_id": "kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@5.14.0-284.69.1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"product": {
"name": "kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"product_id": "kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-uki-virt@5.14.0-284.69.1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"product": {
"name": "python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"product_id": "python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@5.14.0-284.69.1.el9_2?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"product": {
"name": "kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"product_id": "kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@5.14.0-284.69.1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"product": {
"name": "bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"product_id": "bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@7.0.0-284.69.1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"product_id": "kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@5.14.0-284.69.1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"product": {
"name": "kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"product_id": "kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@5.14.0-284.69.1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@5.14.0-284.69.1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"product": {
"name": "kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"product_id": "kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@5.14.0-284.69.1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"product": {
"name": "kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"product_id": "kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@5.14.0-284.69.1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"product": {
"name": "perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"product_id": "perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@5.14.0-284.69.1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"product": {
"name": "python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"product_id": "python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@5.14.0-284.69.1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"product": {
"name": "kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"product_id": "kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@5.14.0-284.69.1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"product": {
"name": "kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"product_id": "kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel-matched@5.14.0-284.69.1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"product": {
"name": "kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"product_id": "kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@5.14.0-284.69.1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"product": {
"name": "kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"product_id": "kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel-matched@5.14.0-284.69.1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"product": {
"name": "kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"product_id": "kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@5.14.0-284.69.1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"product": {
"name": "kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"product_id": "kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@5.14.0-284.69.1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"product": {
"name": "kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"product_id": "kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel-matched@5.14.0-284.69.1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:5.14.0-284.69.1.el9_2.s390x",
"product": {
"name": "perf-0:5.14.0-284.69.1.el9_2.s390x",
"product_id": "perf-0:5.14.0-284.69.1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@5.14.0-284.69.1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rtla-0:5.14.0-284.69.1.el9_2.s390x",
"product": {
"name": "rtla-0:5.14.0-284.69.1.el9_2.s390x",
"product_id": "rtla-0:5.14.0-284.69.1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rtla@5.14.0-284.69.1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"product": {
"name": "bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"product_id": "bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@7.0.0-284.69.1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:5.14.0-284.69.1.el9_2.s390x",
"product": {
"name": "kernel-0:5.14.0-284.69.1.el9_2.s390x",
"product_id": "kernel-0:5.14.0-284.69.1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@5.14.0-284.69.1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"product": {
"name": "kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"product_id": "kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@5.14.0-284.69.1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"product": {
"name": "kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"product_id": "kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@5.14.0-284.69.1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"product": {
"name": "kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"product_id": "kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@5.14.0-284.69.1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"product": {
"name": "kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"product_id": "kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@5.14.0-284.69.1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"product": {
"name": "kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"product_id": "kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-core@5.14.0-284.69.1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"product": {
"name": "kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"product_id": "kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@5.14.0-284.69.1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"product": {
"name": "kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"product_id": "kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@5.14.0-284.69.1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"product": {
"name": "kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"product_id": "kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-core@5.14.0-284.69.1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"product": {
"name": "kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"product_id": "kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@5.14.0-284.69.1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"product": {
"name": "kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"product_id": "kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@5.14.0-284.69.1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"product": {
"name": "kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"product_id": "kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump@5.14.0-284.69.1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"product": {
"name": "kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"product_id": "kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-core@5.14.0-284.69.1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"product": {
"name": "kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"product_id": "kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@5.14.0-284.69.1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"product": {
"name": "kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"product_id": "kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-core@5.14.0-284.69.1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"product": {
"name": "kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"product_id": "kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@5.14.0-284.69.1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"product": {
"name": "python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"product_id": "python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@5.14.0-284.69.1.el9_2?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"product": {
"name": "kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"product_id": "kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@5.14.0-284.69.1.el9_2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"product": {
"name": "kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"product_id": "kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-stablelists@5.14.0-284.69.1.el9_2?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:5.14.0-284.69.1.el9_2.src",
"product": {
"name": "kernel-0:5.14.0-284.69.1.el9_2.src",
"product_id": "kernel-0:5.14.0-284.69.1.el9_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@5.14.0-284.69.1.el9_2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:7.0.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64"
},
"product_reference": "bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:7.0.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:7.0.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x"
},
"product_reference": "bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:7.0.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64"
},
"product_reference": "bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64"
},
"product_reference": "bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x"
},
"product_reference": "bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64"
},
"product_reference": "bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-284.69.1.el9_2.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src"
},
"product_reference": "kernel-0:5.14.0-284.69.1.el9_2.src",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch"
},
"product_reference": "kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:5.14.0-284.69.1.el9_2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch"
},
"product_reference": "kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "perf-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "perf-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "perf-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rtla-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rtla-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rtla-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "rtla-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rtla-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "rtla-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:7.0.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64"
},
"product_reference": "bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:7.0.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:7.0.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x"
},
"product_reference": "bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:7.0.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64"
},
"product_reference": "bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64"
},
"product_reference": "bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x"
},
"product_reference": "bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64"
},
"product_reference": "bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-284.69.1.el9_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src"
},
"product_reference": "kernel-0:5.14.0-284.69.1.el9_2.src",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch"
},
"product_reference": "kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:5.14.0-284.69.1.el9_2.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch"
},
"product_reference": "kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "perf-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "perf-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "perf-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rtla-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rtla-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rtla-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "rtla-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rtla-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "rtla-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:7.0.0-284.69.1.el9_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64"
},
"product_reference": "bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:7.0.0-284.69.1.el9_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:7.0.0-284.69.1.el9_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x"
},
"product_reference": "bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:7.0.0-284.69.1.el9_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64"
},
"product_reference": "bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64"
},
"product_reference": "bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x"
},
"product_reference": "bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64"
},
"product_reference": "bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-284.69.1.el9_2.src as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src"
},
"product_reference": "kernel-0:5.14.0-284.69.1.el9_2.src",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch"
},
"product_reference": "kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:5.14.0-284.69.1.el9_2.noarch as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch"
},
"product_reference": "kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "perf-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "perf-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "perf-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rtla-0:5.14.0-284.69.1.el9_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64"
},
"product_reference": "rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rtla-0:5.14.0-284.69.1.el9_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le"
},
"product_reference": "rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rtla-0:5.14.0-284.69.1.el9_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x"
},
"product_reference": "rtla-0:5.14.0-284.69.1.el9_2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rtla-0:5.14.0-284.69.1.el9_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64"
},
"product_reference": "rtla-0:5.14.0-284.69.1.el9_2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Maxim Levitsky"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2023-5090",
"cwe": {
"id": "CWE-755",
"name": "Improper Handling of Exceptional Conditions"
},
"discovery_date": "2023-09-20T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2248122"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in KVM. An improper check in svm_set_x2apic_msr_interception() may allow direct access to host x2apic msrs when the guest resets its apic, potentially leading to a denial of service condition.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: KVM: SVM: improper check in svm_set_x2apic_msr_interception allows direct access to host x2apic msrs",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 6 and 7 are not affected by this CVE as they did not include support for (de)activating x2AVIC mode, introduced upstream in kernel v6.0 with commit 4d1d794.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64"
],
"known_not_affected": [
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-5090"
},
{
"category": "external",
"summary": "RHBZ#2248122",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2248122"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-5090",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5090"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-5090",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-5090"
}
],
"release_date": "2023-09-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-06-12T02:00:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:3855"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.0,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: KVM: SVM: improper check in svm_set_x2apic_msr_interception allows direct access to host x2apic msrs"
},
{
"cve": "CVE-2023-51779",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2024-01-04T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256822"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Bluetooth subsystem of the Linux kernel. A race condition between the bt_sock_recvmsg() and bt_sock_ioctl() functions could lead to a use-after-free on a socket buffer (\"skb\"). This flaw allows a local user to cause a denial of service condition or potential code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: bluetooth: bt_sock_ioctl race condition leads to use-after-free in bt_sock_recvmsg",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw has been rated as having a Moderate impact because it is believed to be difficult to exploit and it is not clear whether or not it could be used to achieve local privilege escalation.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64"
],
"known_not_affected": [
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-51779"
},
{
"category": "external",
"summary": "RHBZ#2256822",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256822"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-51779",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51779"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-51779",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-51779"
},
{
"category": "external",
"summary": "https://github.com/torvalds/linux/commit/2e07e8348ea454615e268222ae3fc240421be768",
"url": "https://github.com/torvalds/linux/commit/2e07e8348ea454615e268222ae3fc240421be768"
}
],
"release_date": "2023-12-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-06-12T02:00:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:3855"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: bluetooth: bt_sock_ioctl race condition leads to use-after-free in bt_sock_recvmsg"
},
{
"cve": "CVE-2023-52639",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2024-04-03T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2273080"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: s390: vsie: fix race during shadow creation\n\nRight now it is possible to see gmap-\u003eprivate being zero in\nkvm_s390_vsie_gmap_notifier resulting in a crash. This is due to the\nfact that we add gmap-\u003eprivate == kvm after creation:\n\nstatic int acquire_gmap_shadow(struct kvm_vcpu *vcpu,\n struct vsie_page *vsie_page)\n{\n[...]\n gmap = gmap_shadow(vcpu-\u003earch.gmap, asce, edat);\n if (IS_ERR(gmap))\n return PTR_ERR(gmap);\n gmap-\u003eprivate = vcpu-\u003ekvm;\n\nLet children inherit the private field of the parent.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: KVM: s390: vsie: fix race during shadow creation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64"
],
"known_not_affected": [
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-52639"
},
{
"category": "external",
"summary": "RHBZ#2273080",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2273080"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-52639",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52639"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-52639",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-52639"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024040335-CVE-2023-52639-5b67@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024040335-CVE-2023-52639-5b67@gregkh/T"
}
],
"release_date": "2024-04-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-06-12T02:00:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:3855"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: KVM: s390: vsie: fix race during shadow creation"
},
{
"cve": "CVE-2023-52667",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"discovery_date": "2024-05-17T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2281350"
}
],
"notes": [
{
"category": "description",
"text": "A double-free flaw was found in the Linux kernel ConnectX-4 and Connect-IB cards in the Mellanox driver. This issue could allow a local user to crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: net/mlx5e: fix a potential double-free in fs_any_create_groups",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 8 and 9 versions are affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64"
],
"known_not_affected": [
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-52667"
},
{
"category": "external",
"summary": "RHBZ#2281350",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2281350"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-52667",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52667"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-52667",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-52667"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024051728-CVE-2023-52667-649b@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024051728-CVE-2023-52667-649b@gregkh/T"
}
],
"release_date": "2024-05-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-06-12T02:00:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:3855"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent module mlx5_core from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: net/mlx5e: fix a potential double-free in fs_any_create_groups"
},
{
"cve": "CVE-2024-26598",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2024-02-24T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2265801"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel pertaining to a potential use-after-free (UAF) scenario in a system involving Logical Partitioning Interrupts (LPI) translation cache operations. Specifically, the issue arises when a cache hit occurs concurrently with an operation that invalidates the cache, such as a DISCARD ITS command. The root cause is traced to vgic_its_check_cache() not appropriately managing the reference count of the vgic_irq object. Upon returning from this function, the reference count of vgic_irq is not incremented. This issue can lead to the object being prematurely freed while still in use by other parts of the system, potentially resulting in undefined behavior or system instability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: kvm: Avoid potential UAF in LPI translation cache",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The vulnerability is assessed as having a Moderate severity due to its potential to cause system instability or undefined behavior under specific conditions. Specifically, the issue arises from concurrent operations involving the LPI translation cache and commands that invalidate this cache, such as DISCARD ITS commands. The root cause lies in vgic_its_check_cache() failing to increment the reference count of the vgic_irq object before releasing the lock. This oversight can lead to a use-after-free scenario where the object may be prematurely freed while still in use elsewhere in the system. As a consequence, if the object is accessed or modified after being freed, it can result in unpredictable behavior, crashes, or even security vulnerabilities if an attacker can control the timing of cache invalidation and subsequent accesses.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64"
],
"known_not_affected": [
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-26598"
},
{
"category": "external",
"summary": "RHBZ#2265801",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265801"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-26598",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26598"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-26598",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26598"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024022338-CVE-2024-26598-24f4@gregkh/T/#u",
"url": "https://lore.kernel.org/linux-cve-announce/2024022338-CVE-2024-26598-24f4@gregkh/T/#u"
}
],
"release_date": "2024-02-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-06-12T02:00:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:3855"
},
{
"category": "workaround",
"details": "No mitigation is currently available for this vulnerability. Make sure to perform the updates as they become available.",
"product_ids": [
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src",
"AppStream-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src",
"BaseOS-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x",
"BaseOS-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:bpftool-0:7.0.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:bpftool-debuginfo-0:7.0.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.src",
"CRB-9.2.0.Z.EUS:kernel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-64k-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-64k-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-284.69.1.el9_2.noarch",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-cross-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debug-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-devel-matched-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-doc-0:5.14.0-284.69.1.el9_2.noarch",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-headers-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-modules-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-modules-core-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-modules-extra-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-tools-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-uki-virt-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-core-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:perf-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:python3-perf-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-284.69.1.el9_2.x86_64",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.aarch64",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.ppc64le",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.s390x",
"CRB-9.2.0.Z.EUS:rtla-0:5.14.0-284.69.1.el9_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: kvm: Avoid potential UAF in LPI translation cache"
}
]
}
RHSA-2024_4740
Vulnerability from csaf_redhat - Published: 2024-07-23 15:34 - Updated: 2024-12-12 09:56Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 8.8 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: Use after free bug in btsdio_remove due to race condition (CVE-2023-1989)\n\n* kernel: KVM: SEV-ES / SEV-SNP VMGEXIT double fetch vulnerability (CVE-2023-4155)\n\n* kernel: kvm: Avoid potential UAF in LPI translation cache (CVE-2024-26598)\n\n* kernel: wifi: mac80211: fix potential key use-after-free (CVE-2023-52530)\n\n* kernel: drm/amdgpu: use-after-free vulnerability (CVE-2024-26656)\n\n* kernel: KVM: s390: vsie: fix race during shadow creation (CVE-2023-52639)\n\n* kernel: ipv6: sr: fix possible use-after-free and null-ptr-deref (CVE-2024-26735)\n\n* kernel: net: ip_tunnel: prevent perpetual headroom growth (CVE-2024-26804)\n\n* kernel: Bluetooth: Avoid potential use-after-free in hci_error_reset (CVE-2024-26801)\n\n* kernel: netfilter: nf_tables: use timestamp to check for set element timeout (CVE-2024-27397)\n\n* kernel: net/mlx5e: fix a potential double-free in fs_any_create_groups (CVE-2023-52667)\n\n* kernel: wifi: cfg80211: check A-MSDU format more carefully (CVE-2024-35937)\n\n* kernel: net/mlx5: Properly link new fs rules into the tree (CVE-2024-35960)\n\n* kernel: net: ena: Fix incorrect descriptor free behavior (CVE-2024-35958)\n\n* kernel: net: qcom/emac: fix UAF in emac_remove (CVE-2021-47311)\n\n* kernel: net: ti: fix UAF in tlan_remove_one (CVE-2021-47310)\n\n* kernel: ethernet: hisilicon: hns: hns_dsaf_misc: fix a possible array overflow in hns_dsaf_ge_srst_by_port() (CVE-2021-47548)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:4740",
"url": "https://access.redhat.com/errata/RHSA-2024:4740"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2185945",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2185945"
},
{
"category": "external",
"summary": "2213802",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2213802"
},
{
"category": "external",
"summary": "2265801",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265801"
},
{
"category": "external",
"summary": "2267787",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267787"
},
{
"category": "external",
"summary": "2272692",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272692"
},
{
"category": "external",
"summary": "2273080",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2273080"
},
{
"category": "external",
"summary": "2273278",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2273278"
},
{
"category": "external",
"summary": "2273423",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2273423"
},
{
"category": "external",
"summary": "2273429",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2273429"
},
{
"category": "external",
"summary": "2280434",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2280434"
},
{
"category": "external",
"summary": "2281350",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2281350"
},
{
"category": "external",
"summary": "2281821",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2281821"
},
{
"category": "external",
"summary": "2281920",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2281920"
},
{
"category": "external",
"summary": "2281925",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2281925"
},
{
"category": "external",
"summary": "2282471",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282471"
},
{
"category": "external",
"summary": "2282472",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282472"
},
{
"category": "external",
"summary": "2283401",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2283401"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_4740.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2024-12-12T09:56:52+00:00",
"generator": {
"date": "2024-12-12T09:56:52+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.3"
}
},
"id": "RHSA-2024:4740",
"initial_release_date": "2024-07-23T15:34:26+00:00",
"revision_history": [
{
"date": "2024-07-23T15:34:26+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-07-23T15:34:26+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-12T09:56:52+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:8.8::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product": {
"name": "Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.8::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"product": {
"name": "bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"product_id": "bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-477.64.1.el8_8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"product": {
"name": "kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"product_id": "kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-477.64.1.el8_8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"product": {
"name": "kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"product_id": "kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-477.64.1.el8_8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"product_id": "kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-477.64.1.el8_8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"product": {
"name": "kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"product_id": "kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-477.64.1.el8_8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"product": {
"name": "kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"product_id": "kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-477.64.1.el8_8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"product_id": "kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-477.64.1.el8_8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"product_id": "kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-477.64.1.el8_8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-477.64.1.el8_8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"product": {
"name": "kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"product_id": "kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-477.64.1.el8_8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"product": {
"name": "kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"product_id": "kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-477.64.1.el8_8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"product": {
"name": "kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"product_id": "kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-477.64.1.el8_8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"product_id": "kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-477.64.1.el8_8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"product": {
"name": "kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"product_id": "kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-477.64.1.el8_8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"product_id": "kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-477.64.1.el8_8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-477.64.1.el8_8.aarch64",
"product": {
"name": "perf-0:4.18.0-477.64.1.el8_8.aarch64",
"product_id": "perf-0:4.18.0-477.64.1.el8_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-477.64.1.el8_8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"product": {
"name": "python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"product_id": "python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-477.64.1.el8_8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"product_id": "bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-477.64.1.el8_8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-477.64.1.el8_8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"product_id": "kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-477.64.1.el8_8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"product": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-477.64.1.el8_8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-477.64.1.el8_8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"product": {
"name": "perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"product_id": "perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-477.64.1.el8_8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"product_id": "python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-477.64.1.el8_8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-477.64.1.el8_8?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"product": {
"name": "bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"product_id": "bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-477.64.1.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"product": {
"name": "kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"product_id": "kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-477.64.1.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"product": {
"name": "kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"product_id": "kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-477.64.1.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"product": {
"name": "kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"product_id": "kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-477.64.1.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"product": {
"name": "kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"product_id": "kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-477.64.1.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"product": {
"name": "kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"product_id": "kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-477.64.1.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"product": {
"name": "kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"product_id": "kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-477.64.1.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"product": {
"name": "kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"product_id": "kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-477.64.1.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"product_id": "kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-477.64.1.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"product": {
"name": "kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"product_id": "kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-477.64.1.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"product": {
"name": "kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"product_id": "kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-477.64.1.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"product": {
"name": "kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"product_id": "kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-477.64.1.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"product": {
"name": "kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"product_id": "kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-477.64.1.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"product": {
"name": "kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"product_id": "kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-477.64.1.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"product": {
"name": "kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"product_id": "kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-477.64.1.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"product": {
"name": "perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"product_id": "perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-477.64.1.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"product": {
"name": "python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"product_id": "python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-477.64.1.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"product_id": "bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-477.64.1.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"product_id": "kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-477.64.1.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"product": {
"name": "kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"product_id": "kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-477.64.1.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-477.64.1.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"product_id": "kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-477.64.1.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"product": {
"name": "perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"product_id": "perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-477.64.1.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"product_id": "python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-477.64.1.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"product_id": "kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-477.64.1.el8_8?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"product": {
"name": "bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"product_id": "bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-477.64.1.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"product": {
"name": "kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"product_id": "kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-477.64.1.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"product": {
"name": "kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"product_id": "kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-477.64.1.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"product_id": "kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-477.64.1.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"product": {
"name": "kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"product_id": "kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-477.64.1.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"product": {
"name": "kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"product_id": "kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-477.64.1.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"product_id": "kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-477.64.1.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"product_id": "kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-477.64.1.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-477.64.1.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"product": {
"name": "kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"product_id": "kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-477.64.1.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"product": {
"name": "kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"product_id": "kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-477.64.1.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"product": {
"name": "kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"product_id": "kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-477.64.1.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"product_id": "kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-477.64.1.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"product": {
"name": "kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"product_id": "kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-477.64.1.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"product_id": "kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-477.64.1.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-477.64.1.el8_8.x86_64",
"product": {
"name": "perf-0:4.18.0-477.64.1.el8_8.x86_64",
"product_id": "perf-0:4.18.0-477.64.1.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-477.64.1.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"product": {
"name": "python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"product_id": "python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-477.64.1.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"product_id": "bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-477.64.1.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-477.64.1.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"product_id": "kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-477.64.1.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-477.64.1.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-477.64.1.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"product": {
"name": "perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"product_id": "perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-477.64.1.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"product_id": "python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-477.64.1.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-477.64.1.el8_8?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"product": {
"name": "bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"product_id": "bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-477.64.1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-477.64.1.el8_8.s390x",
"product": {
"name": "kernel-0:4.18.0-477.64.1.el8_8.s390x",
"product_id": "kernel-0:4.18.0-477.64.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-477.64.1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"product": {
"name": "kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"product_id": "kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-477.64.1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"product": {
"name": "kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"product_id": "kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-477.64.1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"product": {
"name": "kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"product_id": "kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-477.64.1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"product": {
"name": "kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"product_id": "kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-477.64.1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"product": {
"name": "kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"product_id": "kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-477.64.1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"product": {
"name": "kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"product_id": "kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-477.64.1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"product_id": "kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-477.64.1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"product": {
"name": "kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"product_id": "kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-477.64.1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"product": {
"name": "kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"product_id": "kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-477.64.1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"product": {
"name": "kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"product_id": "kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-477.64.1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"product": {
"name": "kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"product_id": "kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-477.64.1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"product": {
"name": "kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"product_id": "kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-477.64.1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"product": {
"name": "kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"product_id": "kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-477.64.1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"product": {
"name": "kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"product_id": "kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-477.64.1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"product": {
"name": "kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"product_id": "kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-477.64.1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"product": {
"name": "kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"product_id": "kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-477.64.1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"product": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-477.64.1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-477.64.1.el8_8.s390x",
"product": {
"name": "perf-0:4.18.0-477.64.1.el8_8.s390x",
"product_id": "perf-0:4.18.0-477.64.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-477.64.1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"product": {
"name": "python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"product_id": "python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-477.64.1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"product_id": "bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-477.64.1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"product_id": "kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-477.64.1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"product": {
"name": "kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"product_id": "kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-477.64.1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-477.64.1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"product_id": "kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-477.64.1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"product": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-477.64.1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"product": {
"name": "perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"product_id": "perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-477.64.1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"product_id": "python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-477.64.1.el8_8?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:4.18.0-477.64.1.el8_8.src",
"product": {
"name": "kernel-0:4.18.0-477.64.1.el8_8.src",
"product_id": "kernel-0:4.18.0-477.64.1.el8_8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-477.64.1.el8_8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"product": {
"name": "kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"product_id": "kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-stablelists@4.18.0-477.64.1.el8_8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"product": {
"name": "kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"product_id": "kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@4.18.0-477.64.1.el8_8?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-477.64.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64"
},
"product_reference": "bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-477.64.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-477.64.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x"
},
"product_reference": "bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-477.64.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64"
},
"product_reference": "bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-477.64.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64"
},
"product_reference": "kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-477.64.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le"
},
"product_reference": "kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-477.64.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x"
},
"product_reference": "kernel-0:4.18.0-477.64.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-477.64.1.el8_8.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src"
},
"product_reference": "kernel-0:4.18.0-477.64.1.el8_8.src",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-477.64.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64"
},
"product_reference": "kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch"
},
"product_reference": "kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-477.64.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-477.64.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x"
},
"product_reference": "kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-477.64.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-477.64.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-477.64.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-477.64.1.el8_8.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-477.64.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-477.64.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-477.64.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-477.64.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64"
},
"product_reference": "perf-0:4.18.0-477.64.1.el8_8.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-477.64.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le"
},
"product_reference": "perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-477.64.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x"
},
"product_reference": "perf-0:4.18.0-477.64.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-477.64.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64"
},
"product_reference": "perf-0:4.18.0-477.64.1.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-477.64.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-477.64.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x"
},
"product_reference": "python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-477.64.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-477.64.1.el8_8.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64"
},
"product_reference": "bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-477.64.1.el8_8.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-477.64.1.el8_8.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x"
},
"product_reference": "bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-477.64.1.el8_8.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64"
},
"product_reference": "bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-477.64.1.el8_8.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64"
},
"product_reference": "kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-477.64.1.el8_8.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le"
},
"product_reference": "kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-477.64.1.el8_8.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x"
},
"product_reference": "kernel-0:4.18.0-477.64.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-477.64.1.el8_8.src as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src"
},
"product_reference": "kernel-0:4.18.0-477.64.1.el8_8.src",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-477.64.1.el8_8.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64"
},
"product_reference": "kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch"
},
"product_reference": "kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-477.64.1.el8_8.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-477.64.1.el8_8.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x"
},
"product_reference": "kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-477.64.1.el8_8.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-477.64.1.el8_8.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-477.64.1.el8_8.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-477.64.1.el8_8.noarch as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-477.64.1.el8_8.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-477.64.1.el8_8.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-477.64.1.el8_8.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-477.64.1.el8_8.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64"
},
"product_reference": "perf-0:4.18.0-477.64.1.el8_8.aarch64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-477.64.1.el8_8.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le"
},
"product_reference": "perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-477.64.1.el8_8.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x"
},
"product_reference": "perf-0:4.18.0-477.64.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-477.64.1.el8_8.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64"
},
"product_reference": "perf-0:4.18.0-477.64.1.el8_8.x86_64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-477.64.1.el8_8.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-477.64.1.el8_8.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x"
},
"product_reference": "python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-477.64.1.el8_8.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-47310",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2024-05-21T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2282472"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the Linux kernel\u0027s TI TLAN driver, where the tlan_remove_one function can lead to a use-after-free issue when the driver attempts to access private data after the network device has already been freed, potentially causing system instability or crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: net: ti: fix UAF in tlan_remove_one",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated as a moderate because the use-after-free can disrupt network functionality, resulting in service interruptions, but it does not directly compromise sensitive information.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47310"
},
{
"category": "external",
"summary": "RHBZ#2282472",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282472"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47310",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47310"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47310",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47310"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052128-CVE-2021-47310-a59d@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052128-CVE-2021-47310-a59d@gregkh/T"
}
],
"release_date": "2024-05-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-07-23T15:34:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:4740"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: net: ti: fix UAF in tlan_remove_one"
},
{
"cve": "CVE-2021-47311",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2024-05-21T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2282471"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the Linux kernel\u0027s Qualcomm EMAC driver, where the emac_remove function can lead to a use-after-free issue when the driver tries to access data after the network device has been freed, causing instability and a crash in the network subsystem.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: net: qcom/emac: fix UAF in emac_remove",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated as a moderate severity because the use-after-free can disrupt the network operations, leading to potential service interruptions, but it does not directly expose sensitive data; it may result in system instability.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47311"
},
{
"category": "external",
"summary": "RHBZ#2282471",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282471"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47311",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47311"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47311",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47311"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052129-CVE-2021-47311-47f4@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052129-CVE-2021-47311-47f4@gregkh/T"
}
],
"release_date": "2024-05-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-07-23T15:34:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:4740"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: net: qcom/emac: fix UAF in emac_remove"
},
{
"cve": "CVE-2021-47548",
"cwe": {
"id": "CWE-129",
"name": "Improper Validation of Array Index"
},
"discovery_date": "2024-05-24T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2283401"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nethernet: hisilicon: hns: hns_dsaf_misc: fix a possible array overflow in hns_dsaf_ge_srst_by_port()\n\nThe if statement:\n if (port \u003e= DSAF_GE_NUM)\n return;\n\nlimits the value of port less than DSAF_GE_NUM (i.e., 8).\nHowever, if the value of port is 6 or 7, an array overflow could occur:\n port_rst_off = dsaf_dev-\u003emac_cb[port]-\u003eport_rst_off;\n\nbecause the length of dsaf_dev-\u003emac_cb is DSAF_MAX_PORT_NUM (i.e., 6).\n\nTo fix this possible array overflow, we first check port and if it is\ngreater than or equal to DSAF_MAX_PORT_NUM, the function returns.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: ethernet: hisilicon: hns: hns_dsaf_misc: fix a possible array overflow in hns_dsaf_ge_srst_by_port()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47548"
},
{
"category": "external",
"summary": "RHBZ#2283401",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2283401"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47548",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47548"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47548",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47548"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052441-CVE-2021-47548-e9c0@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052441-CVE-2021-47548-e9c0@gregkh/T"
}
],
"release_date": "2024-05-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-07-23T15:34:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:4740"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.0,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: ethernet: hisilicon: hns: hns_dsaf_misc: fix a possible array overflow in hns_dsaf_ge_srst_by_port()"
},
{
"cve": "CVE-2023-1989",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2023-04-11T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2185945"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in btsdio_remove in drivers\\bluetooth\\btsdio.c in the Linux Kernel. A call to btsdio_remove with an unfinished job may cause a race problem which leads to a UAF on hdev devices.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Use after free bug in btsdio_remove due to race condition",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Because successful exploitation of this flaw requires that a system supports SDIO hardware and that an attacker has control over attaching and detaching that hardware, Red Hat assesses the impact of this vulnerability as Moderate.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-1989"
},
{
"category": "external",
"summary": "RHBZ#2185945",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2185945"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-1989",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1989"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-1989",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-1989"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=f132c2d13088",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=f132c2d13088"
}
],
"release_date": "2023-03-09T06:30:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-07-23T15:34:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:4740"
},
{
"category": "workaround",
"details": "This flaw can be mitigated by preventing the affected Generic Bluetooth SDIO driver kernel module from loading during the boot time. Ensure the module is added into the blacklist file.\n~~~\nRefer: \nHow do I blacklist a kernel module to prevent it from loading automatically? \nhttps://access.redhat.com/solutions/41278\n~~~",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Use after free bug in btsdio_remove due to race condition"
},
{
"cve": "CVE-2023-4155",
"cwe": {
"id": "CWE-367",
"name": "Time-of-check Time-of-use (TOCTOU) Race Condition"
},
"discovery_date": "2023-05-09T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2213802"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in KVM AMD Secure Encrypted Virtualization (SEV) in the Linux kernel. A KVM guest using SEV-ES or SEV-SNP with multiple vCPUs can trigger a double fetch race condition vulnerability and invoke the `VMGEXIT` handler recursively. If an attacker manages to call the handler multiple times, they can trigger a stack overflow and cause a denial of service or potentially guest-to-host escape in kernel configurations without stack guard pages (`CONFIG_VMAP_STACK`).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: KVM: SEV-ES / SEV-SNP VMGEXIT double fetch vulnerability",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 6 and 7 are not affected by this flaw, as they did not include support for KVM AMD Secure Encrypted Virtualization (SEV). \nNote: AMD SEV is currently provided as a Technology Preview in RHEL 8, therefore, it is unsupported for production use. For additional details see https://access.redhat.com/articles/4491591 and https://access.redhat.com/support/offerings/techpreview.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-4155"
},
{
"category": "external",
"summary": "RHBZ#2213802",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2213802"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-4155",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4155"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-4155",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-4155"
}
],
"release_date": "2023-08-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-07-23T15:34:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:4740"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: KVM: SEV-ES / SEV-SNP VMGEXIT double fetch vulnerability"
},
{
"cve": "CVE-2023-52530",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2024-03-02T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2267787"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found\u00a0in the Linux kernel\u2019s IEEE 802.11 networking stack implementation functionality, used by Wifi, in how a user triggers the error path of the ieee80211_gtk_rekey_add function. This flaw allows a local user to crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: wifi: mac80211: fix potential key use-after-free",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 9 is not affected by this vulnerability.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-52530"
},
{
"category": "external",
"summary": "RHBZ#2267787",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267787"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-52530",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52530"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-52530",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-52530"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024030255-CVE-2023-52530-ebf0@gregkh/T/#u",
"url": "https://lore.kernel.org/linux-cve-announce/2024030255-CVE-2023-52530-ebf0@gregkh/T/#u"
}
],
"release_date": "2024-03-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-07-23T15:34:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:4740"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: wifi: mac80211: fix potential key use-after-free"
},
{
"cve": "CVE-2023-52639",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2024-04-03T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2273080"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: s390: vsie: fix race during shadow creation\n\nRight now it is possible to see gmap-\u003eprivate being zero in\nkvm_s390_vsie_gmap_notifier resulting in a crash. This is due to the\nfact that we add gmap-\u003eprivate == kvm after creation:\n\nstatic int acquire_gmap_shadow(struct kvm_vcpu *vcpu,\n struct vsie_page *vsie_page)\n{\n[...]\n gmap = gmap_shadow(vcpu-\u003earch.gmap, asce, edat);\n if (IS_ERR(gmap))\n return PTR_ERR(gmap);\n gmap-\u003eprivate = vcpu-\u003ekvm;\n\nLet children inherit the private field of the parent.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: KVM: s390: vsie: fix race during shadow creation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-52639"
},
{
"category": "external",
"summary": "RHBZ#2273080",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2273080"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-52639",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52639"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-52639",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-52639"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024040335-CVE-2023-52639-5b67@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024040335-CVE-2023-52639-5b67@gregkh/T"
}
],
"release_date": "2024-04-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-07-23T15:34:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:4740"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: KVM: s390: vsie: fix race during shadow creation"
},
{
"cve": "CVE-2023-52667",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"discovery_date": "2024-05-17T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2281350"
}
],
"notes": [
{
"category": "description",
"text": "A double-free flaw was found in the Linux kernel ConnectX-4 and Connect-IB cards in the Mellanox driver. This issue could allow a local user to crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: net/mlx5e: fix a potential double-free in fs_any_create_groups",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 8 and 9 versions are affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-52667"
},
{
"category": "external",
"summary": "RHBZ#2281350",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2281350"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-52667",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52667"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-52667",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-52667"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024051728-CVE-2023-52667-649b@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024051728-CVE-2023-52667-649b@gregkh/T"
}
],
"release_date": "2024-05-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-07-23T15:34:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:4740"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent module mlx5_core from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: net/mlx5e: fix a potential double-free in fs_any_create_groups"
},
{
"cve": "CVE-2024-26598",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2024-02-24T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2265801"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel pertaining to a potential use-after-free (UAF) scenario in a system involving Logical Partitioning Interrupts (LPI) translation cache operations. Specifically, the issue arises when a cache hit occurs concurrently with an operation that invalidates the cache, such as a DISCARD ITS command. The root cause is traced to vgic_its_check_cache() not appropriately managing the reference count of the vgic_irq object. Upon returning from this function, the reference count of vgic_irq is not incremented. This issue can lead to the object being prematurely freed while still in use by other parts of the system, potentially resulting in undefined behavior or system instability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: kvm: Avoid potential UAF in LPI translation cache",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The vulnerability is assessed as having a Moderate severity due to its potential to cause system instability or undefined behavior under specific conditions. Specifically, the issue arises from concurrent operations involving the LPI translation cache and commands that invalidate this cache, such as DISCARD ITS commands. The root cause lies in vgic_its_check_cache() failing to increment the reference count of the vgic_irq object before releasing the lock. This oversight can lead to a use-after-free scenario where the object may be prematurely freed while still in use elsewhere in the system. As a consequence, if the object is accessed or modified after being freed, it can result in unpredictable behavior, crashes, or even security vulnerabilities if an attacker can control the timing of cache invalidation and subsequent accesses.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-26598"
},
{
"category": "external",
"summary": "RHBZ#2265801",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265801"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-26598",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26598"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-26598",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26598"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024022338-CVE-2024-26598-24f4@gregkh/T/#u",
"url": "https://lore.kernel.org/linux-cve-announce/2024022338-CVE-2024-26598-24f4@gregkh/T/#u"
}
],
"release_date": "2024-02-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-07-23T15:34:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:4740"
},
{
"category": "workaround",
"details": "No mitigation is currently available for this vulnerability. Make sure to perform the updates as they become available.",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: kvm: Avoid potential UAF in LPI translation cache"
},
{
"cve": "CVE-2024-26656",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2024-04-02T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2272692"
}
],
"notes": [
{
"category": "description",
"text": "A failure flaw was found in the Linux kernel\u2019s AMDGPU driver in how a user sends ioctl with an invalid address and size when using the AMD GPU. This flaw allows a local user to crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: drm/amdgpu: use-after-free vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-26656"
},
{
"category": "external",
"summary": "RHBZ#2272692",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272692"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-26656",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26656"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-26656",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26656"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024040247-CVE-2024-26656-ffaa@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024040247-CVE-2024-26656-ffaa@gregkh/T"
}
],
"release_date": "2024-04-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-07-23T15:34:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:4740"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: drm/amdgpu: use-after-free vulnerability"
},
{
"cve": "CVE-2024-26735",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2024-04-03T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2273278"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s IPv6 protocol functionality. This flaw allows a local user to potentially crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: ipv6: sr: fix possible use-after-free and null-ptr-deref",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-26735"
},
{
"category": "external",
"summary": "RHBZ#2273278",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2273278"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-26735",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26735"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-26735",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26735"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024040359-CVE-2024-26735-462f@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024040359-CVE-2024-26735-462f@gregkh/T"
}
],
"release_date": "2024-04-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-07-23T15:34:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:4740"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: ipv6: sr: fix possible use-after-free and null-ptr-deref"
},
{
"cve": "CVE-2024-26801",
"discovery_date": "2024-04-04T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2273429"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s Bluetooth subsystem in how it handles hardware failure when it occurs. This flaw allows a local user to potentially crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Bluetooth: Avoid potential use-after-free in hci_error_reset",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-26801"
},
{
"category": "external",
"summary": "RHBZ#2273429",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2273429"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-26801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26801"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-26801",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26801"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024040403-CVE-2024-26801-da9f@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024040403-CVE-2024-26801-da9f@gregkh/T"
}
],
"release_date": "2024-04-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-07-23T15:34:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:4740"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Bluetooth: Avoid potential use-after-free in hci_error_reset"
},
{
"cve": "CVE-2024-26804",
"discovery_date": "2024-04-04T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2273423"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s ip_tunnel functionality when a user uses the ip_tunnel infrastructure. This flaw allows a\u00a0local user to crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: net: ip_tunnel: prevent perpetual headroom growth",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-26804"
},
{
"category": "external",
"summary": "RHBZ#2273423",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2273423"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-26804",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26804"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-26804",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26804"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024040404-CVE-2024-26804-a6ff@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024040404-CVE-2024-26804-a6ff@gregkh/T"
}
],
"release_date": "2024-04-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-07-23T15:34:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:4740"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: net: ip_tunnel: prevent perpetual headroom growth"
},
{
"cve": "CVE-2024-27397",
"discovery_date": "2024-05-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2280434"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s netfilter subsystem in how a user triggers the element timeout. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: netfilter: nf_tables: use timestamp to check for set element timeout",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability impact level between Moderate and High, and chosen Moderate.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-27397"
},
{
"category": "external",
"summary": "RHBZ#2280434",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2280434"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-27397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27397"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27397",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27397"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024050837-CVE-2024-27397-fd1e@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024050837-CVE-2024-27397-fd1e@gregkh/T"
}
],
"release_date": "2024-05-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-07-23T15:34:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:4740"
},
{
"category": "workaround",
"details": "In order to trigger the issue, it requires the ability to create user/net namespaces.\n\nOn non-containerized deployments of Red Hat Enterprise Linux 8, you can disable user namespaces by setting user.max_user_namespaces to 0:\n\n# echo \"user.max_user_namespaces=0\" \u003e /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf\n\nOn containerized deployments, such as Red Hat OpenShift Container Platform, do not use this mitigation as the functionality is needed to be enabled.",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: netfilter: nf_tables: use timestamp to check for set element timeout"
},
{
"cve": "CVE-2024-35937",
"discovery_date": "2024-05-19T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2281821"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: cfg80211: check A-MSDU format more carefully\n\nIf it looks like there\u0027s another subframe in the A-MSDU\nbut the header isn\u0027t fully there, we can end up reading\ndata out of bounds, only to discard later. Make this a\nbit more careful and check if the subframe header can\neven be present.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: wifi: cfg80211: check A-MSDU format more carefully",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-35937"
},
{
"category": "external",
"summary": "RHBZ#2281821",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2281821"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35937"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-35937",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-35937"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024051918-CVE-2024-35937-0415@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024051918-CVE-2024-35937-0415@gregkh/T"
}
],
"release_date": "2024-05-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-07-23T15:34:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:4740"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: wifi: cfg80211: check A-MSDU format more carefully"
},
{
"cve": "CVE-2024-35958",
"discovery_date": "2024-05-20T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2281925"
}
],
"notes": [
{
"category": "description",
"text": "This is a vulnerability in the Linux kernel\u0027s Elastic Network Adapter (ENA) driver, which manages network interfaces on certain platforms. The driver utilizes two types of transmit (TX) queues: one for packets from the network stack and another for packets directed by XDP (eXpress Data Path) operations. The function ena_free_tx_bufs() is responsible for unmapping and freeing descriptors of uncompleted TX transactions. However, it incorrectly assumes that all TX queues handle packets from the network stack, leading to improper handling of descriptors in XDP-specific queues. This mismanagement can result in descriptors not being freed correctly, potentially causing system crashes, especially during a Virtual Function (VF) reset. The issue has been resolved by updating the driver to correctly differentiate between the two types of TX queues, ensuring proper descriptor management. Users are advised to update their Linux kernel to a version that includes this fix to maintain system stability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: net: ena: Fix incorrect descriptor free behavior",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-35958"
},
{
"category": "external",
"summary": "RHBZ#2281925",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2281925"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-35958",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35958"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-35958",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-35958"
}
],
"release_date": "2024-05-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-07-23T15:34:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:4740"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: net: ena: Fix incorrect descriptor free behavior"
},
{
"cve": "CVE-2024-35960",
"discovery_date": "2024-05-20T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2281920"
}
],
"notes": [
{
"category": "description",
"text": "CVE-2024-35960 is a vulnerability in the Linux kernel\u0027s Mellanox MLX5 driver that affects flow steering rule handling. When identical rules are created and referenced multiple times, they can fail to properly link into the rule tree, leaving them uninitialized. This can cause system crashes during rule deletion due to invalid references. The issue has been fixed by ensuring all newly created rules are properly initialized and linked. Updating to a patched kernel version resolves the problem and ensures system stability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: net/mlx5: Properly link new fs rules into the tree",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-35960"
},
{
"category": "external",
"summary": "RHBZ#2281920",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2281920"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-35960",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35960"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-35960",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-35960"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052020-CVE-2024-35960-2eaa@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052020-CVE-2024-35960-2eaa@gregkh/T"
}
],
"release_date": "2024-05-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-07-23T15:34:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:4740"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: net/mlx5: Properly link new fs rules into the tree"
}
]
}
RHSA-2024:4740
Vulnerability from csaf_redhat - Published: 2024-07-23 15:34 - Updated: 2026-02-02 15:20Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 8.8 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: Use after free bug in btsdio_remove due to race condition (CVE-2023-1989)\n\n* kernel: KVM: SEV-ES / SEV-SNP VMGEXIT double fetch vulnerability (CVE-2023-4155)\n\n* kernel: kvm: Avoid potential UAF in LPI translation cache (CVE-2024-26598)\n\n* kernel: wifi: mac80211: fix potential key use-after-free (CVE-2023-52530)\n\n* kernel: drm/amdgpu: use-after-free vulnerability (CVE-2024-26656)\n\n* kernel: KVM: s390: vsie: fix race during shadow creation (CVE-2023-52639)\n\n* kernel: ipv6: sr: fix possible use-after-free and null-ptr-deref (CVE-2024-26735)\n\n* kernel: net: ip_tunnel: prevent perpetual headroom growth (CVE-2024-26804)\n\n* kernel: Bluetooth: Avoid potential use-after-free in hci_error_reset (CVE-2024-26801)\n\n* kernel: netfilter: nf_tables: use timestamp to check for set element timeout (CVE-2024-27397)\n\n* kernel: net/mlx5e: fix a potential double-free in fs_any_create_groups (CVE-2023-52667)\n\n* kernel: wifi: cfg80211: check A-MSDU format more carefully (CVE-2024-35937)\n\n* kernel: net/mlx5: Properly link new fs rules into the tree (CVE-2024-35960)\n\n* kernel: net: ena: Fix incorrect descriptor free behavior (CVE-2024-35958)\n\n* kernel: net: qcom/emac: fix UAF in emac_remove (CVE-2021-47311)\n\n* kernel: net: ti: fix UAF in tlan_remove_one (CVE-2021-47310)\n\n* kernel: ethernet: hisilicon: hns: hns_dsaf_misc: fix a possible array overflow in hns_dsaf_ge_srst_by_port() (CVE-2021-47548)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:4740",
"url": "https://access.redhat.com/errata/RHSA-2024:4740"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2185945",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2185945"
},
{
"category": "external",
"summary": "2213802",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2213802"
},
{
"category": "external",
"summary": "2265801",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265801"
},
{
"category": "external",
"summary": "2267787",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267787"
},
{
"category": "external",
"summary": "2272692",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272692"
},
{
"category": "external",
"summary": "2273080",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2273080"
},
{
"category": "external",
"summary": "2273278",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2273278"
},
{
"category": "external",
"summary": "2273423",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2273423"
},
{
"category": "external",
"summary": "2273429",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2273429"
},
{
"category": "external",
"summary": "2280434",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2280434"
},
{
"category": "external",
"summary": "2281350",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2281350"
},
{
"category": "external",
"summary": "2281821",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2281821"
},
{
"category": "external",
"summary": "2281920",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2281920"
},
{
"category": "external",
"summary": "2281925",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2281925"
},
{
"category": "external",
"summary": "2282471",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282471"
},
{
"category": "external",
"summary": "2282472",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282472"
},
{
"category": "external",
"summary": "2283401",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2283401"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_4740.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2026-02-02T15:20:05+00:00",
"generator": {
"date": "2026-02-02T15:20:05+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.16"
}
},
"id": "RHSA-2024:4740",
"initial_release_date": "2024-07-23T15:34:26+00:00",
"revision_history": [
{
"date": "2024-07-23T15:34:26+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-07-23T15:34:26+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-02T15:20:05+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:8.8::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product": {
"name": "Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.8::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"product": {
"name": "bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"product_id": "bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-477.64.1.el8_8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"product": {
"name": "kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"product_id": "kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-477.64.1.el8_8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"product": {
"name": "kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"product_id": "kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-477.64.1.el8_8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"product": {
"name": "kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"product_id": "kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-477.64.1.el8_8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"product": {
"name": "kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"product_id": "kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-477.64.1.el8_8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"product_id": "kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-477.64.1.el8_8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"product_id": "kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-477.64.1.el8_8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-477.64.1.el8_8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"product": {
"name": "kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"product_id": "kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-477.64.1.el8_8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"product": {
"name": "kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"product_id": "kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-477.64.1.el8_8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"product_id": "kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-477.64.1.el8_8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"product": {
"name": "kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"product_id": "kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-477.64.1.el8_8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"product_id": "kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-477.64.1.el8_8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-477.64.1.el8_8.aarch64",
"product": {
"name": "perf-0:4.18.0-477.64.1.el8_8.aarch64",
"product_id": "perf-0:4.18.0-477.64.1.el8_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-477.64.1.el8_8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"product": {
"name": "python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"product_id": "python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-477.64.1.el8_8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"product_id": "bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-477.64.1.el8_8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-477.64.1.el8_8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"product_id": "kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-477.64.1.el8_8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"product": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-477.64.1.el8_8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-477.64.1.el8_8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"product": {
"name": "perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"product_id": "perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-477.64.1.el8_8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"product_id": "python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-477.64.1.el8_8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-477.64.1.el8_8?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"product": {
"name": "bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"product_id": "bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-477.64.1.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"product": {
"name": "kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"product_id": "kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-477.64.1.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"product": {
"name": "kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"product_id": "kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-477.64.1.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"product": {
"name": "kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"product_id": "kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-477.64.1.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"product": {
"name": "kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"product_id": "kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-477.64.1.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"product": {
"name": "kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"product_id": "kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-477.64.1.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"product": {
"name": "kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"product_id": "kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-477.64.1.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"product_id": "kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-477.64.1.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"product": {
"name": "kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"product_id": "kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-477.64.1.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"product": {
"name": "kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"product_id": "kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-477.64.1.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"product": {
"name": "kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"product_id": "kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-477.64.1.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"product": {
"name": "kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"product_id": "kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-477.64.1.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"product": {
"name": "kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"product_id": "kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-477.64.1.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"product": {
"name": "perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"product_id": "perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-477.64.1.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"product": {
"name": "python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"product_id": "python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-477.64.1.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"product_id": "bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-477.64.1.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"product_id": "kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-477.64.1.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"product": {
"name": "kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"product_id": "kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-477.64.1.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-477.64.1.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"product_id": "kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-477.64.1.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"product": {
"name": "perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"product_id": "perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-477.64.1.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"product_id": "python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-477.64.1.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"product_id": "kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-477.64.1.el8_8?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"product": {
"name": "bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"product_id": "bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-477.64.1.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"product": {
"name": "kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"product_id": "kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-477.64.1.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"product": {
"name": "kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"product_id": "kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-477.64.1.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"product": {
"name": "kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"product_id": "kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-477.64.1.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"product": {
"name": "kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"product_id": "kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-477.64.1.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"product_id": "kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-477.64.1.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"product_id": "kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-477.64.1.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-477.64.1.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"product": {
"name": "kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"product_id": "kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-477.64.1.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"product": {
"name": "kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"product_id": "kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-477.64.1.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"product_id": "kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-477.64.1.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"product": {
"name": "kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"product_id": "kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-477.64.1.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"product_id": "kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-477.64.1.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-477.64.1.el8_8.x86_64",
"product": {
"name": "perf-0:4.18.0-477.64.1.el8_8.x86_64",
"product_id": "perf-0:4.18.0-477.64.1.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-477.64.1.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"product": {
"name": "python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"product_id": "python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-477.64.1.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"product_id": "bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-477.64.1.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-477.64.1.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"product_id": "kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-477.64.1.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-477.64.1.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-477.64.1.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"product": {
"name": "perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"product_id": "perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-477.64.1.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"product_id": "python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-477.64.1.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-477.64.1.el8_8?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"product": {
"name": "bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"product_id": "bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-477.64.1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-477.64.1.el8_8.s390x",
"product": {
"name": "kernel-0:4.18.0-477.64.1.el8_8.s390x",
"product_id": "kernel-0:4.18.0-477.64.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-477.64.1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"product": {
"name": "kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"product_id": "kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-477.64.1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"product": {
"name": "kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"product_id": "kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-477.64.1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"product": {
"name": "kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"product_id": "kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-477.64.1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"product": {
"name": "kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"product_id": "kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-477.64.1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"product": {
"name": "kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"product_id": "kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-477.64.1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"product_id": "kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-477.64.1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"product": {
"name": "kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"product_id": "kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-477.64.1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"product": {
"name": "kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"product_id": "kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-477.64.1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"product": {
"name": "kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"product_id": "kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-477.64.1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"product": {
"name": "kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"product_id": "kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-477.64.1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"product": {
"name": "kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"product_id": "kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-477.64.1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"product": {
"name": "kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"product_id": "kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-477.64.1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"product": {
"name": "kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"product_id": "kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-477.64.1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"product": {
"name": "kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"product_id": "kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-477.64.1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"product": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-477.64.1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-477.64.1.el8_8.s390x",
"product": {
"name": "perf-0:4.18.0-477.64.1.el8_8.s390x",
"product_id": "perf-0:4.18.0-477.64.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-477.64.1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"product": {
"name": "python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"product_id": "python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-477.64.1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"product_id": "bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-477.64.1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"product_id": "kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-477.64.1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"product": {
"name": "kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"product_id": "kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-477.64.1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-477.64.1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"product_id": "kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-477.64.1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"product": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-477.64.1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"product": {
"name": "perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"product_id": "perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-477.64.1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"product_id": "python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-477.64.1.el8_8?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:4.18.0-477.64.1.el8_8.src",
"product": {
"name": "kernel-0:4.18.0-477.64.1.el8_8.src",
"product_id": "kernel-0:4.18.0-477.64.1.el8_8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-477.64.1.el8_8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"product": {
"name": "kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"product_id": "kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-stablelists@4.18.0-477.64.1.el8_8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"product": {
"name": "kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"product_id": "kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@4.18.0-477.64.1.el8_8?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-477.64.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64"
},
"product_reference": "bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-477.64.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-477.64.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x"
},
"product_reference": "bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-477.64.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64"
},
"product_reference": "bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-477.64.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64"
},
"product_reference": "kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-477.64.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le"
},
"product_reference": "kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-477.64.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x"
},
"product_reference": "kernel-0:4.18.0-477.64.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-477.64.1.el8_8.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src"
},
"product_reference": "kernel-0:4.18.0-477.64.1.el8_8.src",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-477.64.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64"
},
"product_reference": "kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch"
},
"product_reference": "kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-477.64.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-477.64.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x"
},
"product_reference": "kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-477.64.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-477.64.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-477.64.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-477.64.1.el8_8.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-477.64.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-477.64.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-477.64.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64"
},
"product_reference": "perf-0:4.18.0-477.64.1.el8_8.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-477.64.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le"
},
"product_reference": "perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-477.64.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x"
},
"product_reference": "perf-0:4.18.0-477.64.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-477.64.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64"
},
"product_reference": "perf-0:4.18.0-477.64.1.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-477.64.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-477.64.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x"
},
"product_reference": "python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-477.64.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-477.64.1.el8_8.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64"
},
"product_reference": "bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-477.64.1.el8_8.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-477.64.1.el8_8.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x"
},
"product_reference": "bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-477.64.1.el8_8.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64"
},
"product_reference": "bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-477.64.1.el8_8.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64"
},
"product_reference": "kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-477.64.1.el8_8.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le"
},
"product_reference": "kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-477.64.1.el8_8.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x"
},
"product_reference": "kernel-0:4.18.0-477.64.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-477.64.1.el8_8.src as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src"
},
"product_reference": "kernel-0:4.18.0-477.64.1.el8_8.src",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-477.64.1.el8_8.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64"
},
"product_reference": "kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch"
},
"product_reference": "kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-477.64.1.el8_8.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-477.64.1.el8_8.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x"
},
"product_reference": "kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-477.64.1.el8_8.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-477.64.1.el8_8.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-477.64.1.el8_8.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-477.64.1.el8_8.noarch as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-477.64.1.el8_8.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-477.64.1.el8_8.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-477.64.1.el8_8.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64"
},
"product_reference": "perf-0:4.18.0-477.64.1.el8_8.aarch64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-477.64.1.el8_8.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le"
},
"product_reference": "perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-477.64.1.el8_8.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x"
},
"product_reference": "perf-0:4.18.0-477.64.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-477.64.1.el8_8.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64"
},
"product_reference": "perf-0:4.18.0-477.64.1.el8_8.x86_64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-477.64.1.el8_8.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-477.64.1.el8_8.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x"
},
"product_reference": "python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-477.64.1.el8_8.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-47310",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2024-05-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2282472"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the Linux kernel\u0027s TI TLAN driver, where the tlan_remove_one function can lead to a use-after-free issue when the driver attempts to access private data after the network device has already been freed, potentially causing system instability or crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: net: ti: fix UAF in tlan_remove_one",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated as a moderate because the use-after-free can disrupt network functionality, resulting in service interruptions, but it does not directly compromise sensitive information.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47310"
},
{
"category": "external",
"summary": "RHBZ#2282472",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282472"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47310",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47310"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47310",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47310"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052128-CVE-2021-47310-a59d@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052128-CVE-2021-47310-a59d@gregkh/T"
}
],
"release_date": "2024-05-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-07-23T15:34:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:4740"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: net: ti: fix UAF in tlan_remove_one"
},
{
"cve": "CVE-2021-47311",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2024-05-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2282471"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the Linux kernel\u0027s Qualcomm EMAC driver, where the emac_remove function can lead to a use-after-free issue when the driver tries to access data after the network device has been freed, causing instability and a crash in the network subsystem.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: net: qcom/emac: fix UAF in emac_remove",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated as a moderate severity because the use-after-free can disrupt the network operations, leading to potential service interruptions, but it does not directly expose sensitive data; it may result in system instability.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47311"
},
{
"category": "external",
"summary": "RHBZ#2282471",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282471"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47311",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47311"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47311",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47311"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052129-CVE-2021-47311-47f4@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052129-CVE-2021-47311-47f4@gregkh/T"
}
],
"release_date": "2024-05-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-07-23T15:34:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:4740"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: net: qcom/emac: fix UAF in emac_remove"
},
{
"cve": "CVE-2021-47548",
"cwe": {
"id": "CWE-129",
"name": "Improper Validation of Array Index"
},
"discovery_date": "2024-05-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2283401"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the Linux kernel\u0027s Hisilicon Ethernet driver, in the hns_dsaf_ge_srst_by_port() function, which allows for a possible array overflow, which occurs when an input value exceeds the expected range, leading to potential memory corruption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: ethernet: hisilicon: hns: hns_dsaf_misc: fix a possible array overflow in hns_dsaf_ge_srst_by_port()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The affected kernel module is only provided for the aarch64 architecture. Other architectures (such as x86_64 and s390x) are not affected by this vulnerability.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47548"
},
{
"category": "external",
"summary": "RHBZ#2283401",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2283401"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47548",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47548"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47548",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47548"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052441-CVE-2021-47548-e9c0@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052441-CVE-2021-47548-e9c0@gregkh/T"
}
],
"release_date": "2024-05-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-07-23T15:34:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:4740"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.0,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: ethernet: hisilicon: hns: hns_dsaf_misc: fix a possible array overflow in hns_dsaf_ge_srst_by_port()"
},
{
"cve": "CVE-2023-1989",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2023-04-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2185945"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in btsdio_remove in drivers\\bluetooth\\btsdio.c in the Linux Kernel. A call to btsdio_remove with an unfinished job may cause a race problem which leads to a UAF on hdev devices.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Use after free bug in btsdio_remove due to race condition",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Because successful exploitation of this flaw requires that a system supports SDIO hardware and that an attacker has control over attaching and detaching that hardware, Red Hat assesses the impact of this vulnerability as Moderate.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-1989"
},
{
"category": "external",
"summary": "RHBZ#2185945",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2185945"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-1989",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1989"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-1989",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-1989"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=f132c2d13088",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=f132c2d13088"
}
],
"release_date": "2023-03-09T06:30:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-07-23T15:34:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:4740"
},
{
"category": "workaround",
"details": "This flaw can be mitigated by preventing the affected Generic Bluetooth SDIO driver kernel module from loading during the boot time. Ensure the module is added into the blacklist file.\n~~~\nRefer: \nHow do I blacklist a kernel module to prevent it from loading automatically? \nhttps://access.redhat.com/solutions/41278\n~~~",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Use after free bug in btsdio_remove due to race condition"
},
{
"cve": "CVE-2023-4155",
"cwe": {
"id": "CWE-367",
"name": "Time-of-check Time-of-use (TOCTOU) Race Condition"
},
"discovery_date": "2023-05-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2213802"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in KVM AMD Secure Encrypted Virtualization (SEV) in the Linux kernel. A KVM guest using SEV-ES or SEV-SNP with multiple vCPUs can trigger a double fetch race condition vulnerability and invoke the `VMGEXIT` handler recursively. If an attacker manages to call the handler multiple times, they can trigger a stack overflow and cause a denial of service or potentially guest-to-host escape in kernel configurations without stack guard pages (`CONFIG_VMAP_STACK`).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: KVM: SEV-ES / SEV-SNP VMGEXIT double fetch vulnerability",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 6 and 7 are not affected by this flaw, as they did not include support for KVM AMD Secure Encrypted Virtualization (SEV). \nNote: AMD SEV is currently provided as a Technology Preview in RHEL 8, therefore, it is unsupported for production use. For additional details see https://access.redhat.com/articles/4491591 and https://access.redhat.com/support/offerings/techpreview.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-4155"
},
{
"category": "external",
"summary": "RHBZ#2213802",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2213802"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-4155",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4155"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-4155",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-4155"
}
],
"release_date": "2023-08-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-07-23T15:34:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:4740"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: KVM: SEV-ES / SEV-SNP VMGEXIT double fetch vulnerability"
},
{
"cve": "CVE-2023-52530",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2024-03-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2267787"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found\u00a0in the Linux kernel\u2019s IEEE 802.11 networking stack implementation functionality, used by Wifi, in how a user triggers the error path of the ieee80211_gtk_rekey_add function. This flaw allows a local user to crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: wifi: mac80211: fix potential key use-after-free",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 9 is not affected by this vulnerability.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-52530"
},
{
"category": "external",
"summary": "RHBZ#2267787",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267787"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-52530",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52530"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-52530",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-52530"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024030255-CVE-2023-52530-ebf0@gregkh/T/#u",
"url": "https://lore.kernel.org/linux-cve-announce/2024030255-CVE-2023-52530-ebf0@gregkh/T/#u"
}
],
"release_date": "2024-03-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-07-23T15:34:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:4740"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: wifi: mac80211: fix potential key use-after-free"
},
{
"cve": "CVE-2023-52639",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2024-04-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2273080"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: s390: vsie: fix race during shadow creation\n\nRight now it is possible to see gmap-\u003eprivate being zero in\nkvm_s390_vsie_gmap_notifier resulting in a crash. This is due to the\nfact that we add gmap-\u003eprivate == kvm after creation:\n\nstatic int acquire_gmap_shadow(struct kvm_vcpu *vcpu,\n struct vsie_page *vsie_page)\n{\n[...]\n gmap = gmap_shadow(vcpu-\u003earch.gmap, asce, edat);\n if (IS_ERR(gmap))\n return PTR_ERR(gmap);\n gmap-\u003eprivate = vcpu-\u003ekvm;\n\nLet children inherit the private field of the parent.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: KVM: s390: vsie: fix race during shadow creation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-52639"
},
{
"category": "external",
"summary": "RHBZ#2273080",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2273080"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-52639",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52639"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-52639",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-52639"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024040335-CVE-2023-52639-5b67@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024040335-CVE-2023-52639-5b67@gregkh/T"
}
],
"release_date": "2024-04-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-07-23T15:34:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:4740"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: KVM: s390: vsie: fix race during shadow creation"
},
{
"cve": "CVE-2023-52667",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"discovery_date": "2024-05-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2281350"
}
],
"notes": [
{
"category": "description",
"text": "A double-free flaw was found in the Linux kernel ConnectX-4 and Connect-IB cards in the Mellanox driver. This issue could allow a local user to crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: net/mlx5e: fix a potential double-free in fs_any_create_groups",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 8 and 9 versions are affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-52667"
},
{
"category": "external",
"summary": "RHBZ#2281350",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2281350"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-52667",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52667"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-52667",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-52667"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024051728-CVE-2023-52667-649b@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024051728-CVE-2023-52667-649b@gregkh/T"
}
],
"release_date": "2024-05-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-07-23T15:34:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:4740"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent module mlx5_core from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: net/mlx5e: fix a potential double-free in fs_any_create_groups"
},
{
"cve": "CVE-2024-26598",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2024-02-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2265801"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel pertaining to a potential use-after-free (UAF) scenario in a system involving Logical Partitioning Interrupts (LPI) translation cache operations. Specifically, the issue arises when a cache hit occurs concurrently with an operation that invalidates the cache, such as a DISCARD ITS command. The root cause is traced to vgic_its_check_cache() not appropriately managing the reference count of the vgic_irq object. Upon returning from this function, the reference count of vgic_irq is not incremented. This issue can lead to the object being prematurely freed while still in use by other parts of the system, potentially resulting in undefined behavior or system instability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: kvm: Avoid potential UAF in LPI translation cache",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The vulnerability is assessed as having a Moderate severity due to its potential to cause system instability or undefined behavior under specific conditions. Specifically, the issue arises from concurrent operations involving the LPI translation cache and commands that invalidate this cache, such as DISCARD ITS commands. The root cause lies in vgic_its_check_cache() failing to increment the reference count of the vgic_irq object before releasing the lock. This oversight can lead to a use-after-free scenario where the object may be prematurely freed while still in use elsewhere in the system. As a consequence, if the object is accessed or modified after being freed, it can result in unpredictable behavior, crashes, or even security vulnerabilities if an attacker can control the timing of cache invalidation and subsequent accesses.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-26598"
},
{
"category": "external",
"summary": "RHBZ#2265801",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265801"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-26598",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26598"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-26598",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26598"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024022338-CVE-2024-26598-24f4@gregkh/T/#u",
"url": "https://lore.kernel.org/linux-cve-announce/2024022338-CVE-2024-26598-24f4@gregkh/T/#u"
}
],
"release_date": "2024-02-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-07-23T15:34:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:4740"
},
{
"category": "workaround",
"details": "No mitigation is currently available for this vulnerability. Make sure to perform the updates as they become available.",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: kvm: Avoid potential UAF in LPI translation cache"
},
{
"cve": "CVE-2024-26656",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2024-04-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2272692"
}
],
"notes": [
{
"category": "description",
"text": "A failure flaw was found in the Linux kernel\u2019s AMDGPU driver in how a user sends ioctl with an invalid address and size when using the AMD GPU. This flaw allows a local user to crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: drm/amdgpu: use-after-free vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-26656"
},
{
"category": "external",
"summary": "RHBZ#2272692",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272692"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-26656",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26656"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-26656",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26656"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024040247-CVE-2024-26656-ffaa@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024040247-CVE-2024-26656-ffaa@gregkh/T"
}
],
"release_date": "2024-04-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-07-23T15:34:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:4740"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: drm/amdgpu: use-after-free vulnerability"
},
{
"cve": "CVE-2024-26735",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2024-04-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2273278"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s IPv6 protocol functionality. This flaw allows a local user to potentially crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: ipv6: sr: fix possible use-after-free and null-ptr-deref",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-26735"
},
{
"category": "external",
"summary": "RHBZ#2273278",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2273278"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-26735",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26735"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-26735",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26735"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024040359-CVE-2024-26735-462f@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024040359-CVE-2024-26735-462f@gregkh/T"
}
],
"release_date": "2024-04-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-07-23T15:34:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:4740"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: ipv6: sr: fix possible use-after-free and null-ptr-deref"
},
{
"cve": "CVE-2024-26801",
"discovery_date": "2024-04-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2273429"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s Bluetooth subsystem in how it handles hardware failure when it occurs. This flaw allows a local user to potentially crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Bluetooth: Avoid potential use-after-free in hci_error_reset",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-26801"
},
{
"category": "external",
"summary": "RHBZ#2273429",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2273429"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-26801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26801"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-26801",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26801"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024040403-CVE-2024-26801-da9f@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024040403-CVE-2024-26801-da9f@gregkh/T"
}
],
"release_date": "2024-04-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-07-23T15:34:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:4740"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Bluetooth: Avoid potential use-after-free in hci_error_reset"
},
{
"cve": "CVE-2024-26804",
"discovery_date": "2024-04-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2273423"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s ip_tunnel functionality when a user uses the ip_tunnel infrastructure. This flaw allows a\u00a0local user to crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: net: ip_tunnel: prevent perpetual headroom growth",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-26804"
},
{
"category": "external",
"summary": "RHBZ#2273423",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2273423"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-26804",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26804"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-26804",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26804"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024040404-CVE-2024-26804-a6ff@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024040404-CVE-2024-26804-a6ff@gregkh/T"
}
],
"release_date": "2024-04-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-07-23T15:34:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:4740"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: net: ip_tunnel: prevent perpetual headroom growth"
},
{
"cve": "CVE-2024-27397",
"discovery_date": "2024-05-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2280434"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s netfilter subsystem in how a user triggers the element timeout. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: netfilter: nf_tables: use timestamp to check for set element timeout",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability impact level between Moderate and High, and chosen Moderate.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-27397"
},
{
"category": "external",
"summary": "RHBZ#2280434",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2280434"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-27397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27397"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27397",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27397"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024050837-CVE-2024-27397-fd1e@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024050837-CVE-2024-27397-fd1e@gregkh/T"
}
],
"release_date": "2024-05-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-07-23T15:34:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:4740"
},
{
"category": "workaround",
"details": "In order to trigger the issue, it requires the ability to create user/net namespaces.\n\nOn non-containerized deployments of Red Hat Enterprise Linux 8, you can disable user namespaces by setting user.max_user_namespaces to 0:\n\n# echo \"user.max_user_namespaces=0\" \u003e /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf\n\nOn containerized deployments, such as Red Hat OpenShift Container Platform, do not use this mitigation as the functionality is needed to be enabled.",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: netfilter: nf_tables: use timestamp to check for set element timeout"
},
{
"cve": "CVE-2024-35937",
"discovery_date": "2024-05-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2281821"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: cfg80211: check A-MSDU format more carefully\n\nIf it looks like there\u0027s another subframe in the A-MSDU\nbut the header isn\u0027t fully there, we can end up reading\ndata out of bounds, only to discard later. Make this a\nbit more careful and check if the subframe header can\neven be present.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: wifi: cfg80211: check A-MSDU format more carefully",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-35937"
},
{
"category": "external",
"summary": "RHBZ#2281821",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2281821"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35937"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-35937",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-35937"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024051918-CVE-2024-35937-0415@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024051918-CVE-2024-35937-0415@gregkh/T"
}
],
"release_date": "2024-05-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-07-23T15:34:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:4740"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: wifi: cfg80211: check A-MSDU format more carefully"
},
{
"cve": "CVE-2024-35958",
"discovery_date": "2024-05-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2281925"
}
],
"notes": [
{
"category": "description",
"text": "This is a vulnerability in the Linux kernel\u0027s Elastic Network Adapter (ENA) driver, which manages network interfaces on certain platforms. The driver utilizes two types of transmit (TX) queues: one for packets from the network stack and another for packets directed by XDP (eXpress Data Path) operations. The function ena_free_tx_bufs() is responsible for unmapping and freeing descriptors of uncompleted TX transactions. However, it incorrectly assumes that all TX queues handle packets from the network stack, leading to improper handling of descriptors in XDP-specific queues. This mismanagement can result in descriptors not being freed correctly, potentially causing system crashes, especially during a Virtual Function (VF) reset. The issue has been resolved by updating the driver to correctly differentiate between the two types of TX queues, ensuring proper descriptor management. Users are advised to update their Linux kernel to a version that includes this fix to maintain system stability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: net: ena: Fix incorrect descriptor free behavior",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-35958"
},
{
"category": "external",
"summary": "RHBZ#2281925",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2281925"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-35958",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35958"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-35958",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-35958"
}
],
"release_date": "2024-05-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-07-23T15:34:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:4740"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: net: ena: Fix incorrect descriptor free behavior"
},
{
"cve": "CVE-2024-35960",
"discovery_date": "2024-05-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2281920"
}
],
"notes": [
{
"category": "description",
"text": "CVE-2024-35960 is a vulnerability in the Linux kernel\u0027s Mellanox MLX5 driver that affects flow steering rule handling. When identical rules are created and referenced multiple times, they can fail to properly link into the rule tree, leaving them uninitialized. This can cause system crashes during rule deletion due to invalid references. The issue has been fixed by ensuring all newly created rules are properly initialized and linked. Updating to a patched kernel version resolves the problem and ensures system stability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: net/mlx5: Properly link new fs rules into the tree",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-35960"
},
{
"category": "external",
"summary": "RHBZ#2281920",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2281920"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-35960",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35960"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-35960",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-35960"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052020-CVE-2024-35960-2eaa@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052020-CVE-2024-35960-2eaa@gregkh/T"
}
],
"release_date": "2024-05-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-07-23T15:34:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:4740"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.64.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.64.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.64.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: net/mlx5: Properly link new fs rules into the tree"
}
]
}
RHSA-2024:3854
Vulnerability from csaf_redhat - Published: 2024-06-12 01:43 - Updated: 2025-11-21 19:04Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 9.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: KVM: SVM: improper check in svm_set_x2apic_msr_interception allows direct access to host x2apic msrs (CVE-2023-5090)\n\n* kernel: bluetooth: bt_sock_ioctl race condition leads to use-after-free in bt_sock_recvmsg (CVE-2023-51779)\n\n* kernel: kvm: Avoid potential UAF in LPI translation cache (CVE-2024-26598)\n\n* kernel: net/mlx5e: fix a potential double-free in fs_any_create_groups (CVE-2023-52667)\n\nBug Fix:\n\n* kernel-rt: update RT source tree to the latest RHEL-9.2 ad hoc schedule build (JIRA:RHEL-38545)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:3854",
"url": "https://access.redhat.com/errata/RHSA-2024:3854"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2248122",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2248122"
},
{
"category": "external",
"summary": "2256822",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256822"
},
{
"category": "external",
"summary": "2265801",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265801"
},
{
"category": "external",
"summary": "2281350",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2281350"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_3854.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
"tracking": {
"current_release_date": "2025-11-21T19:04:03+00:00",
"generator": {
"date": "2025-11-21T19:04:03+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2024:3854",
"initial_release_date": "2024-06-12T01:43:14+00:00",
"revision_history": [
{
"date": "2024-06-12T01:43:14+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-06-12T01:43:14+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T19:04:03+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Real Time EUS (v.9.2)",
"product": {
"name": "Red Hat Enterprise Linux Real Time EUS (v.9.2)",
"product_id": "RT-9.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:9.2::realtime"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Real Time for NFV EUS (v.9.2)",
"product": {
"name": "Red Hat Enterprise Linux Real Time for NFV EUS (v.9.2)",
"product_id": "NFV-9.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:9.2::nfv"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.src",
"product": {
"name": "kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.src",
"product_id": "kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@5.14.0-284.69.1.rt14.354.el9_2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"product": {
"name": "kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"product_id": "kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@5.14.0-284.69.1.rt14.354.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"product": {
"name": "kernel-rt-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"product_id": "kernel-rt-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-core@5.14.0-284.69.1.rt14.354.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"product": {
"name": "kernel-rt-debug-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"product_id": "kernel-rt-debug-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@5.14.0-284.69.1.rt14.354.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"product": {
"name": "kernel-rt-debug-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"product_id": "kernel-rt-debug-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-core@5.14.0-284.69.1.rt14.354.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"product_id": "kernel-rt-debug-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@5.14.0-284.69.1.rt14.354.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"product_id": "kernel-rt-debug-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@5.14.0-284.69.1.rt14.354.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"product": {
"name": "kernel-rt-debug-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"product_id": "kernel-rt-debug-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules@5.14.0-284.69.1.rt14.354.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"product": {
"name": "kernel-rt-debug-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"product_id": "kernel-rt-debug-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules-core@5.14.0-284.69.1.rt14.354.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"product": {
"name": "kernel-rt-debug-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"product_id": "kernel-rt-debug-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@5.14.0-284.69.1.rt14.354.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"product": {
"name": "kernel-rt-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"product_id": "kernel-rt-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@5.14.0-284.69.1.rt14.354.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"product": {
"name": "kernel-rt-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"product_id": "kernel-rt-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm@5.14.0-284.69.1.rt14.354.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"product": {
"name": "kernel-rt-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"product_id": "kernel-rt-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules@5.14.0-284.69.1.rt14.354.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"product": {
"name": "kernel-rt-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"product_id": "kernel-rt-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules-core@5.14.0-284.69.1.rt14.354.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"product": {
"name": "kernel-rt-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"product_id": "kernel-rt-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules-extra@5.14.0-284.69.1.rt14.354.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@5.14.0-284.69.1.rt14.354.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"product_id": "kernel-rt-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@5.14.0-284.69.1.rt14.354.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@5.14.0-284.69.1.rt14.354.el9_2?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.src as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v.9.2)",
"product_id": "NFV-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.src"
},
"product_reference": "kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.src",
"relates_to_product_reference": "NFV-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v.9.2)",
"product_id": "NFV-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64"
},
"product_reference": "kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"relates_to_product_reference": "NFV-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v.9.2)",
"product_id": "NFV-9.2.0.Z.EUS:kernel-rt-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64"
},
"product_reference": "kernel-rt-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"relates_to_product_reference": "NFV-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v.9.2)",
"product_id": "NFV-9.2.0.Z.EUS:kernel-rt-debug-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64"
},
"product_reference": "kernel-rt-debug-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"relates_to_product_reference": "NFV-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v.9.2)",
"product_id": "NFV-9.2.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"relates_to_product_reference": "NFV-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v.9.2)",
"product_id": "NFV-9.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"relates_to_product_reference": "NFV-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v.9.2)",
"product_id": "NFV-9.2.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"relates_to_product_reference": "NFV-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v.9.2)",
"product_id": "NFV-9.2.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"relates_to_product_reference": "NFV-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v.9.2)",
"product_id": "NFV-9.2.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"relates_to_product_reference": "NFV-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v.9.2)",
"product_id": "NFV-9.2.0.Z.EUS:kernel-rt-debug-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64"
},
"product_reference": "kernel-rt-debug-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"relates_to_product_reference": "NFV-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v.9.2)",
"product_id": "NFV-9.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"relates_to_product_reference": "NFV-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v.9.2)",
"product_id": "NFV-9.2.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"relates_to_product_reference": "NFV-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v.9.2)",
"product_id": "NFV-9.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"relates_to_product_reference": "NFV-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v.9.2)",
"product_id": "NFV-9.2.0.Z.EUS:kernel-rt-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64"
},
"product_reference": "kernel-rt-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"relates_to_product_reference": "NFV-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v.9.2)",
"product_id": "NFV-9.2.0.Z.EUS:kernel-rt-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64"
},
"product_reference": "kernel-rt-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"relates_to_product_reference": "NFV-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v.9.2)",
"product_id": "NFV-9.2.0.Z.EUS:kernel-rt-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64"
},
"product_reference": "kernel-rt-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"relates_to_product_reference": "NFV-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v.9.2)",
"product_id": "NFV-9.2.0.Z.EUS:kernel-rt-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64"
},
"product_reference": "kernel-rt-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"relates_to_product_reference": "NFV-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v.9.2)",
"product_id": "NFV-9.2.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"relates_to_product_reference": "NFV-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.src as a component of Red Hat Enterprise Linux Real Time EUS (v.9.2)",
"product_id": "RT-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.src"
},
"product_reference": "kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.src",
"relates_to_product_reference": "RT-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v.9.2)",
"product_id": "RT-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64"
},
"product_reference": "kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"relates_to_product_reference": "RT-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v.9.2)",
"product_id": "RT-9.2.0.Z.EUS:kernel-rt-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64"
},
"product_reference": "kernel-rt-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"relates_to_product_reference": "RT-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v.9.2)",
"product_id": "RT-9.2.0.Z.EUS:kernel-rt-debug-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64"
},
"product_reference": "kernel-rt-debug-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"relates_to_product_reference": "RT-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v.9.2)",
"product_id": "RT-9.2.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"relates_to_product_reference": "RT-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v.9.2)",
"product_id": "RT-9.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"relates_to_product_reference": "RT-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v.9.2)",
"product_id": "RT-9.2.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"relates_to_product_reference": "RT-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v.9.2)",
"product_id": "RT-9.2.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"relates_to_product_reference": "RT-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v.9.2)",
"product_id": "RT-9.2.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"relates_to_product_reference": "RT-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v.9.2)",
"product_id": "RT-9.2.0.Z.EUS:kernel-rt-debug-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64"
},
"product_reference": "kernel-rt-debug-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"relates_to_product_reference": "RT-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v.9.2)",
"product_id": "RT-9.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"relates_to_product_reference": "RT-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v.9.2)",
"product_id": "RT-9.2.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"relates_to_product_reference": "RT-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v.9.2)",
"product_id": "RT-9.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"relates_to_product_reference": "RT-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v.9.2)",
"product_id": "RT-9.2.0.Z.EUS:kernel-rt-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64"
},
"product_reference": "kernel-rt-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"relates_to_product_reference": "RT-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v.9.2)",
"product_id": "RT-9.2.0.Z.EUS:kernel-rt-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64"
},
"product_reference": "kernel-rt-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"relates_to_product_reference": "RT-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v.9.2)",
"product_id": "RT-9.2.0.Z.EUS:kernel-rt-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64"
},
"product_reference": "kernel-rt-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"relates_to_product_reference": "RT-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v.9.2)",
"product_id": "RT-9.2.0.Z.EUS:kernel-rt-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64"
},
"product_reference": "kernel-rt-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"relates_to_product_reference": "RT-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v.9.2)",
"product_id": "RT-9.2.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"relates_to_product_reference": "RT-9.2.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Maxim Levitsky"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2023-5090",
"cwe": {
"id": "CWE-755",
"name": "Improper Handling of Exceptional Conditions"
},
"discovery_date": "2023-09-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2248122"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in KVM. An improper check in svm_set_x2apic_msr_interception() may allow direct access to host x2apic msrs when the guest resets its apic, potentially leading to a denial of service condition.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: KVM: SVM: improper check in svm_set_x2apic_msr_interception allows direct access to host x2apic msrs",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 6 and 7 are not affected by this CVE as they did not include support for (de)activating x2AVIC mode, introduced upstream in kernel v6.0 with commit 4d1d794.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.src",
"NFV-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.src",
"RT-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-5090"
},
{
"category": "external",
"summary": "RHBZ#2248122",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2248122"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-5090",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5090"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-5090",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-5090"
}
],
"release_date": "2023-09-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-06-12T01:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.src",
"NFV-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.src",
"RT-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:3854"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.src",
"NFV-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.src",
"RT-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.0,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.src",
"NFV-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.src",
"RT-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: KVM: SVM: improper check in svm_set_x2apic_msr_interception allows direct access to host x2apic msrs"
},
{
"cve": "CVE-2023-51779",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2024-01-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256822"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Bluetooth subsystem of the Linux kernel. A race condition between the bt_sock_recvmsg() and bt_sock_ioctl() functions could lead to a use-after-free on a socket buffer (\"skb\"). This flaw allows a local user to cause a denial of service condition or potential code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: bluetooth: bt_sock_ioctl race condition leads to use-after-free in bt_sock_recvmsg",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw has been rated as having a Moderate impact because it is believed to be difficult to exploit and it is not clear whether or not it could be used to achieve local privilege escalation.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.src",
"NFV-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.src",
"RT-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-51779"
},
{
"category": "external",
"summary": "RHBZ#2256822",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256822"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-51779",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51779"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-51779",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-51779"
},
{
"category": "external",
"summary": "https://github.com/torvalds/linux/commit/2e07e8348ea454615e268222ae3fc240421be768",
"url": "https://github.com/torvalds/linux/commit/2e07e8348ea454615e268222ae3fc240421be768"
}
],
"release_date": "2023-12-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-06-12T01:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.src",
"NFV-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.src",
"RT-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:3854"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.src",
"NFV-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.src",
"RT-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: bluetooth: bt_sock_ioctl race condition leads to use-after-free in bt_sock_recvmsg"
},
{
"cve": "CVE-2023-52667",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"discovery_date": "2024-05-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2281350"
}
],
"notes": [
{
"category": "description",
"text": "A double-free flaw was found in the Linux kernel ConnectX-4 and Connect-IB cards in the Mellanox driver. This issue could allow a local user to crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: net/mlx5e: fix a potential double-free in fs_any_create_groups",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 8 and 9 versions are affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.src",
"NFV-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.src",
"RT-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-52667"
},
{
"category": "external",
"summary": "RHBZ#2281350",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2281350"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-52667",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52667"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-52667",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-52667"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024051728-CVE-2023-52667-649b@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024051728-CVE-2023-52667-649b@gregkh/T"
}
],
"release_date": "2024-05-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-06-12T01:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.src",
"NFV-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.src",
"RT-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:3854"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent module mlx5_core from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"NFV-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.src",
"NFV-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.src",
"RT-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.src",
"NFV-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.src",
"RT-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: net/mlx5e: fix a potential double-free in fs_any_create_groups"
},
{
"cve": "CVE-2024-26598",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2024-02-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2265801"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel pertaining to a potential use-after-free (UAF) scenario in a system involving Logical Partitioning Interrupts (LPI) translation cache operations. Specifically, the issue arises when a cache hit occurs concurrently with an operation that invalidates the cache, such as a DISCARD ITS command. The root cause is traced to vgic_its_check_cache() not appropriately managing the reference count of the vgic_irq object. Upon returning from this function, the reference count of vgic_irq is not incremented. This issue can lead to the object being prematurely freed while still in use by other parts of the system, potentially resulting in undefined behavior or system instability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: kvm: Avoid potential UAF in LPI translation cache",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The vulnerability is assessed as having a Moderate severity due to its potential to cause system instability or undefined behavior under specific conditions. Specifically, the issue arises from concurrent operations involving the LPI translation cache and commands that invalidate this cache, such as DISCARD ITS commands. The root cause lies in vgic_its_check_cache() failing to increment the reference count of the vgic_irq object before releasing the lock. This oversight can lead to a use-after-free scenario where the object may be prematurely freed while still in use elsewhere in the system. As a consequence, if the object is accessed or modified after being freed, it can result in unpredictable behavior, crashes, or even security vulnerabilities if an attacker can control the timing of cache invalidation and subsequent accesses.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.src",
"NFV-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.src",
"RT-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-26598"
},
{
"category": "external",
"summary": "RHBZ#2265801",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265801"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-26598",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26598"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-26598",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26598"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024022338-CVE-2024-26598-24f4@gregkh/T/#u",
"url": "https://lore.kernel.org/linux-cve-announce/2024022338-CVE-2024-26598-24f4@gregkh/T/#u"
}
],
"release_date": "2024-02-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-06-12T01:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.src",
"NFV-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.src",
"RT-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:3854"
},
{
"category": "workaround",
"details": "No mitigation is currently available for this vulnerability. Make sure to perform the updates as they become available.",
"product_ids": [
"NFV-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.src",
"NFV-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.src",
"RT-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.src",
"NFV-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.src",
"RT-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: kvm: Avoid potential UAF in LPI translation cache"
}
]
}
RHSA-2024_3854
Vulnerability from csaf_redhat - Published: 2024-06-12 01:43 - Updated: 2024-12-11 16:41Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 9.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: KVM: SVM: improper check in svm_set_x2apic_msr_interception allows direct access to host x2apic msrs (CVE-2023-5090)\n\n* kernel: bluetooth: bt_sock_ioctl race condition leads to use-after-free in bt_sock_recvmsg (CVE-2023-51779)\n\n* kernel: kvm: Avoid potential UAF in LPI translation cache (CVE-2024-26598)\n\n* kernel: net/mlx5e: fix a potential double-free in fs_any_create_groups (CVE-2023-52667)\n\nBug Fix:\n\n* kernel-rt: update RT source tree to the latest RHEL-9.2 ad hoc schedule build (JIRA:RHEL-38545)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:3854",
"url": "https://access.redhat.com/errata/RHSA-2024:3854"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2248122",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2248122"
},
{
"category": "external",
"summary": "2256822",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256822"
},
{
"category": "external",
"summary": "2265801",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265801"
},
{
"category": "external",
"summary": "2281350",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2281350"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_3854.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
"tracking": {
"current_release_date": "2024-12-11T16:41:41+00:00",
"generator": {
"date": "2024-12-11T16:41:41+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.3"
}
},
"id": "RHSA-2024:3854",
"initial_release_date": "2024-06-12T01:43:14+00:00",
"revision_history": [
{
"date": "2024-06-12T01:43:14+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-06-12T01:43:14+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-11T16:41:41+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Real Time EUS (v.9.2)",
"product": {
"name": "Red Hat Enterprise Linux Real Time EUS (v.9.2)",
"product_id": "RT-9.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:9.2::realtime"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Real Time for NFV EUS (v.9.2)",
"product": {
"name": "Red Hat Enterprise Linux Real Time for NFV EUS (v.9.2)",
"product_id": "NFV-9.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:9.2::nfv"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.src",
"product": {
"name": "kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.src",
"product_id": "kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@5.14.0-284.69.1.rt14.354.el9_2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"product": {
"name": "kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"product_id": "kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@5.14.0-284.69.1.rt14.354.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"product": {
"name": "kernel-rt-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"product_id": "kernel-rt-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-core@5.14.0-284.69.1.rt14.354.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"product": {
"name": "kernel-rt-debug-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"product_id": "kernel-rt-debug-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@5.14.0-284.69.1.rt14.354.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"product": {
"name": "kernel-rt-debug-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"product_id": "kernel-rt-debug-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-core@5.14.0-284.69.1.rt14.354.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"product_id": "kernel-rt-debug-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@5.14.0-284.69.1.rt14.354.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"product_id": "kernel-rt-debug-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@5.14.0-284.69.1.rt14.354.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"product": {
"name": "kernel-rt-debug-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"product_id": "kernel-rt-debug-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules@5.14.0-284.69.1.rt14.354.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"product": {
"name": "kernel-rt-debug-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"product_id": "kernel-rt-debug-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules-core@5.14.0-284.69.1.rt14.354.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"product": {
"name": "kernel-rt-debug-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"product_id": "kernel-rt-debug-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@5.14.0-284.69.1.rt14.354.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"product": {
"name": "kernel-rt-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"product_id": "kernel-rt-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@5.14.0-284.69.1.rt14.354.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"product": {
"name": "kernel-rt-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"product_id": "kernel-rt-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm@5.14.0-284.69.1.rt14.354.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"product": {
"name": "kernel-rt-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"product_id": "kernel-rt-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules@5.14.0-284.69.1.rt14.354.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"product": {
"name": "kernel-rt-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"product_id": "kernel-rt-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules-core@5.14.0-284.69.1.rt14.354.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"product": {
"name": "kernel-rt-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"product_id": "kernel-rt-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules-extra@5.14.0-284.69.1.rt14.354.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@5.14.0-284.69.1.rt14.354.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"product_id": "kernel-rt-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@5.14.0-284.69.1.rt14.354.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@5.14.0-284.69.1.rt14.354.el9_2?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.src as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v.9.2)",
"product_id": "NFV-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.src"
},
"product_reference": "kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.src",
"relates_to_product_reference": "NFV-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v.9.2)",
"product_id": "NFV-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64"
},
"product_reference": "kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"relates_to_product_reference": "NFV-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v.9.2)",
"product_id": "NFV-9.2.0.Z.EUS:kernel-rt-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64"
},
"product_reference": "kernel-rt-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"relates_to_product_reference": "NFV-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v.9.2)",
"product_id": "NFV-9.2.0.Z.EUS:kernel-rt-debug-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64"
},
"product_reference": "kernel-rt-debug-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"relates_to_product_reference": "NFV-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v.9.2)",
"product_id": "NFV-9.2.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"relates_to_product_reference": "NFV-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v.9.2)",
"product_id": "NFV-9.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"relates_to_product_reference": "NFV-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v.9.2)",
"product_id": "NFV-9.2.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"relates_to_product_reference": "NFV-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v.9.2)",
"product_id": "NFV-9.2.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"relates_to_product_reference": "NFV-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v.9.2)",
"product_id": "NFV-9.2.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"relates_to_product_reference": "NFV-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v.9.2)",
"product_id": "NFV-9.2.0.Z.EUS:kernel-rt-debug-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64"
},
"product_reference": "kernel-rt-debug-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"relates_to_product_reference": "NFV-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v.9.2)",
"product_id": "NFV-9.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"relates_to_product_reference": "NFV-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v.9.2)",
"product_id": "NFV-9.2.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"relates_to_product_reference": "NFV-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v.9.2)",
"product_id": "NFV-9.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"relates_to_product_reference": "NFV-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v.9.2)",
"product_id": "NFV-9.2.0.Z.EUS:kernel-rt-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64"
},
"product_reference": "kernel-rt-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"relates_to_product_reference": "NFV-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v.9.2)",
"product_id": "NFV-9.2.0.Z.EUS:kernel-rt-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64"
},
"product_reference": "kernel-rt-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"relates_to_product_reference": "NFV-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v.9.2)",
"product_id": "NFV-9.2.0.Z.EUS:kernel-rt-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64"
},
"product_reference": "kernel-rt-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"relates_to_product_reference": "NFV-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v.9.2)",
"product_id": "NFV-9.2.0.Z.EUS:kernel-rt-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64"
},
"product_reference": "kernel-rt-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"relates_to_product_reference": "NFV-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v.9.2)",
"product_id": "NFV-9.2.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"relates_to_product_reference": "NFV-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.src as a component of Red Hat Enterprise Linux Real Time EUS (v.9.2)",
"product_id": "RT-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.src"
},
"product_reference": "kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.src",
"relates_to_product_reference": "RT-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v.9.2)",
"product_id": "RT-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64"
},
"product_reference": "kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"relates_to_product_reference": "RT-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v.9.2)",
"product_id": "RT-9.2.0.Z.EUS:kernel-rt-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64"
},
"product_reference": "kernel-rt-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"relates_to_product_reference": "RT-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v.9.2)",
"product_id": "RT-9.2.0.Z.EUS:kernel-rt-debug-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64"
},
"product_reference": "kernel-rt-debug-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"relates_to_product_reference": "RT-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v.9.2)",
"product_id": "RT-9.2.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"relates_to_product_reference": "RT-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v.9.2)",
"product_id": "RT-9.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"relates_to_product_reference": "RT-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v.9.2)",
"product_id": "RT-9.2.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"relates_to_product_reference": "RT-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v.9.2)",
"product_id": "RT-9.2.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"relates_to_product_reference": "RT-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v.9.2)",
"product_id": "RT-9.2.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"relates_to_product_reference": "RT-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v.9.2)",
"product_id": "RT-9.2.0.Z.EUS:kernel-rt-debug-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64"
},
"product_reference": "kernel-rt-debug-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"relates_to_product_reference": "RT-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v.9.2)",
"product_id": "RT-9.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"relates_to_product_reference": "RT-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v.9.2)",
"product_id": "RT-9.2.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"relates_to_product_reference": "RT-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v.9.2)",
"product_id": "RT-9.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"relates_to_product_reference": "RT-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v.9.2)",
"product_id": "RT-9.2.0.Z.EUS:kernel-rt-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64"
},
"product_reference": "kernel-rt-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"relates_to_product_reference": "RT-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v.9.2)",
"product_id": "RT-9.2.0.Z.EUS:kernel-rt-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64"
},
"product_reference": "kernel-rt-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"relates_to_product_reference": "RT-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v.9.2)",
"product_id": "RT-9.2.0.Z.EUS:kernel-rt-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64"
},
"product_reference": "kernel-rt-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"relates_to_product_reference": "RT-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v.9.2)",
"product_id": "RT-9.2.0.Z.EUS:kernel-rt-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64"
},
"product_reference": "kernel-rt-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"relates_to_product_reference": "RT-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v.9.2)",
"product_id": "RT-9.2.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"relates_to_product_reference": "RT-9.2.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Maxim Levitsky"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2023-5090",
"cwe": {
"id": "CWE-755",
"name": "Improper Handling of Exceptional Conditions"
},
"discovery_date": "2023-09-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2248122"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in KVM. An improper check in svm_set_x2apic_msr_interception() may allow direct access to host x2apic msrs when the guest resets its apic, potentially leading to a denial of service condition.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: KVM: SVM: improper check in svm_set_x2apic_msr_interception allows direct access to host x2apic msrs",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 6 and 7 are not affected by this CVE as they did not include support for (de)activating x2AVIC mode, introduced upstream in kernel v6.0 with commit 4d1d794.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.src",
"NFV-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.src",
"RT-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-5090"
},
{
"category": "external",
"summary": "RHBZ#2248122",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2248122"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-5090",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5090"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-5090",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-5090"
}
],
"release_date": "2023-09-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-06-12T01:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.src",
"NFV-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.src",
"RT-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:3854"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.src",
"NFV-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.src",
"RT-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.0,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.src",
"NFV-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.src",
"RT-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: KVM: SVM: improper check in svm_set_x2apic_msr_interception allows direct access to host x2apic msrs"
},
{
"cve": "CVE-2023-51779",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2024-01-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256822"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Bluetooth subsystem of the Linux kernel. A race condition between the bt_sock_recvmsg() and bt_sock_ioctl() functions could lead to a use-after-free on a socket buffer (\"skb\"). This flaw allows a local user to cause a denial of service condition or potential code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: bluetooth: bt_sock_ioctl race condition leads to use-after-free in bt_sock_recvmsg",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw has been rated as having a Moderate impact because it is believed to be difficult to exploit and it is not clear whether or not it could be used to achieve local privilege escalation.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.src",
"NFV-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.src",
"RT-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-51779"
},
{
"category": "external",
"summary": "RHBZ#2256822",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256822"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-51779",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51779"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-51779",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-51779"
},
{
"category": "external",
"summary": "https://github.com/torvalds/linux/commit/2e07e8348ea454615e268222ae3fc240421be768",
"url": "https://github.com/torvalds/linux/commit/2e07e8348ea454615e268222ae3fc240421be768"
}
],
"release_date": "2023-12-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-06-12T01:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.src",
"NFV-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.src",
"RT-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:3854"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.src",
"NFV-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.src",
"RT-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: bluetooth: bt_sock_ioctl race condition leads to use-after-free in bt_sock_recvmsg"
},
{
"cve": "CVE-2023-52667",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"discovery_date": "2024-05-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2281350"
}
],
"notes": [
{
"category": "description",
"text": "A double-free flaw was found in the Linux kernel ConnectX-4 and Connect-IB cards in the Mellanox driver. This issue could allow a local user to crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: net/mlx5e: fix a potential double-free in fs_any_create_groups",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 8 and 9 versions are affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.src",
"NFV-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.src",
"RT-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-52667"
},
{
"category": "external",
"summary": "RHBZ#2281350",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2281350"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-52667",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52667"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-52667",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-52667"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024051728-CVE-2023-52667-649b@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024051728-CVE-2023-52667-649b@gregkh/T"
}
],
"release_date": "2024-05-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-06-12T01:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.src",
"NFV-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.src",
"RT-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:3854"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent module mlx5_core from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"NFV-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.src",
"NFV-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.src",
"RT-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.src",
"NFV-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.src",
"RT-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: net/mlx5e: fix a potential double-free in fs_any_create_groups"
},
{
"cve": "CVE-2024-26598",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2024-02-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2265801"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel pertaining to a potential use-after-free (UAF) scenario in a system involving Logical Partitioning Interrupts (LPI) translation cache operations. Specifically, the issue arises when a cache hit occurs concurrently with an operation that invalidates the cache, such as a DISCARD ITS command. The root cause is traced to vgic_its_check_cache() not appropriately managing the reference count of the vgic_irq object. Upon returning from this function, the reference count of vgic_irq is not incremented. This issue can lead to the object being prematurely freed while still in use by other parts of the system, potentially resulting in undefined behavior or system instability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: kvm: Avoid potential UAF in LPI translation cache",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The vulnerability is assessed as having a Moderate severity due to its potential to cause system instability or undefined behavior under specific conditions. Specifically, the issue arises from concurrent operations involving the LPI translation cache and commands that invalidate this cache, such as DISCARD ITS commands. The root cause lies in vgic_its_check_cache() failing to increment the reference count of the vgic_irq object before releasing the lock. This oversight can lead to a use-after-free scenario where the object may be prematurely freed while still in use elsewhere in the system. As a consequence, if the object is accessed or modified after being freed, it can result in unpredictable behavior, crashes, or even security vulnerabilities if an attacker can control the timing of cache invalidation and subsequent accesses.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.src",
"NFV-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.src",
"RT-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-26598"
},
{
"category": "external",
"summary": "RHBZ#2265801",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265801"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-26598",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26598"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-26598",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26598"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024022338-CVE-2024-26598-24f4@gregkh/T/#u",
"url": "https://lore.kernel.org/linux-cve-announce/2024022338-CVE-2024-26598-24f4@gregkh/T/#u"
}
],
"release_date": "2024-02-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-06-12T01:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.src",
"NFV-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.src",
"RT-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:3854"
},
{
"category": "workaround",
"details": "No mitigation is currently available for this vulnerability. Make sure to perform the updates as they become available.",
"product_ids": [
"NFV-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.src",
"NFV-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.src",
"RT-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.src",
"NFV-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"NFV-9.2.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.src",
"RT-9.2.0.Z.EUS:kernel-rt-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-devel-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-kvm-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-modules-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-modules-core-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64",
"RT-9.2.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-284.69.1.rt14.354.el9_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: kvm: Avoid potential UAF in LPI translation cache"
}
]
}
SUSE-SU-2024:0910-1
Vulnerability from csaf_suse - Published: 2024-03-15 12:43 - Updated: 2024-03-15 12:43Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\n\nThe SUSE Linux Enterprise 15 SP5 RT kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2019-25162: Fixed a potential use after free (bsc#1220409).\n- CVE-2021-46923: Fixed reference leakage in fs/mount_setattr (bsc#1220457).\n- CVE-2021-46924: Fixed fix memory leak in device probe and remove (bsc#1220459)\n- CVE-2021-46932: Fixed missing work initialization before device registration (bsc#1220444)\n- CVE-2023-28746: Fixed Register File Data Sampling (bsc#1213456).\n- CVE-2023-5197: Fixed se-after-free due to addition and removal of rules from chain bindings within the same transaction (bsc#1218216).\n- CVE-2023-52340: Fixed ICMPv6 \u201cPacket Too Big\u201d packets force a DoS of the Linux kernel by forcing 100% CPU (bsc#1219295).\n- CVE-2023-52429: Fixed potential DoS in dm_table_create in drivers/md/dm-table.c (bsc#1219827).\n- CVE-2023-52439: Fixed use-after-free in uio_open (bsc#1220140).\n- CVE-2023-52443: Fixed crash when parsed profile name is empty (bsc#1220240).\n- CVE-2023-52445: Fixed use after free on context disconnection (bsc#1220241).\n- CVE-2023-52447: Fixed map_fd_put_ptr() signature kABI workaround (bsc#1220251).\n- CVE-2023-52448: Fixed kernel NULL pointer dereference in gfs2_rgrp_dump (bsc#1220253).\n- CVE-2023-52449: Fixed gluebi NULL pointer dereference caused by ftl notifier (bsc#1220238).\n- CVE-2023-52451: Fixed access beyond end of drmem array (bsc#1220250).\n- CVE-2023-52452: Fixed Fix accesses to uninit stack slots (bsc#1220257).\n- CVE-2023-52456: Fixed tx statemachine deadlock (bsc#1220364).\n- CVE-2023-52457: Fixed skipped resource freeing if pm_runtime_resume_and_get() failed (bsc#1220350).\n- CVE-2023-52463: Fixed null pointer dereference in efivarfs (bsc#1220328).\n- CVE-2023-52464: Fixed possible out-of-bounds string access (bsc#1220330)\n- CVE-2023-52475: Fixed use-after-free in powermate_config_complete (bsc#1220649)\n- CVE-2023-52478: Fixed kernel crash on receiver USB disconnect (bsc#1220796)\n- CVE-2023-6817: Fixed use-after-free in nft_pipapo_walk (bsc#1218195).\n- CVE-2024-0607: Fixed 64-bit load issue in nft_byteorder_eval() (bsc#1218915).\n- CVE-2024-1151: Fixed unlimited number of recursions from action sets (bsc#1219835).\n- CVE-2024-23849: Fixed array-index-out-of-bounds in rds_cmsg_recv (bsc#1219127).\n- CVE-2024-23850: Fixed double free of anonymous device after snapshot creation failure (bsc#1219126).\n- CVE-2024-23851: Fixed crash in copy_params in drivers/md/dm-ioctl.c (bsc#1219146).\n- CVE-2024-25744: Fixed Security issue with int 80 interrupt vector (bsc#1217927).\n- CVE-2024-26585: Fixed race between tx work scheduling and socket close (bsc#1220187).\n- CVE-2024-26586: Fixed stack corruption (bsc#1220243).\n- CVE-2024-26589: Fixed out of bounds read due to variable offset alu on PTR_TO_FLOW_KEYS (bsc#1220255).\n- CVE-2024-26591: Fixed re-attachment branch in bpf_tracing_prog_attach (bsc#1220254).\n- CVE-2024-26593: Fixed block process call transactions (bsc#1220009).\n- CVE-2024-26595: Fixed NULL pointer dereference in error path (bsc#1220344).\n- CVE-2024-26598: Fixed potential UAF in LPI translation cache (bsc#1220326).\n- CVE-2024-26602: Fixed overall slowdowns with sys_membarrier (bsc1220398).\n- CVE-2024-26603: Fixed infinite loop via #PF handling (bsc#1220335).\n- CVE-2024-26622: Fixed UAF write bug in tomoyo_write_control() (bsc#1220825).\n\nThe following non-security bugs were fixed:\n\n- acpi: apei: set memory failure flags as mf_action_required on synchronous events (git-fixes).\n- acpi: button: add lid disable dmi quirk for nextbook ares 8a (git-fixes).\n- acpi: extlog: fix null pointer dereference check (git-fixes).\n- acpi: resource: add asus model s5402za to quirks (git-fixes).\n- acpi: resource: skip irq override on asus expertbook b1502cba (git-fixes).\n- acpi: resource: skip irq override on asus expertbook b2402cba (git-fixes).\n- acpi: video: add backlight=native dmi quirk for apple imac11,3 (git-fixes).\n- acpi: video: add backlight=native dmi quirk for apple imac12,1 and imac12,2 (git-fixes).\n- acpi: video: add backlight=native dmi quirk for lenovo thinkpad x131e (3371 amd version) (git-fixes).\n- acpi: video: add quirk for the colorful x15 at 23 laptop (git-fixes).\n- add reference to recently released cve\n- afs: fix the usage of read_seqbegin_or_lock() in afs_find_server*() (git-fixes).\n- afs: fix the usage of read_seqbegin_or_lock() in afs_lookup_volume_rcu() (git-fixes).\n- afs: hide silly-rename files from userspace (git-fixes).\n- afs: increase buffer size in afs_update_volume_status() (git-fixes).\n- ahci: asm1166: correct count of reported ports (git-fixes).\n- alsa: drop leftover snd-rtctimer stuff from makefile (git-fixes).\n- alsa: firewire-lib: fix to check cycle continuity (git-fixes).\n- alsa: hda/conexant: add quirk for sws js201d (git-fixes).\n- alsa: hda/realtek: apply headset jack quirk for non-bass alc287 thinkpads (git-fixes).\n- alsa: hda/realtek: cs35l41: fix device id / model name (git-fixes).\n- alsa: hda/realtek: cs35l41: fix order and duplicates in quirks table (git-fixes).\n- alsa: hda/realtek: enable headset mic on vaio vjfe-adl (git-fixes).\n- alsa: hda/realtek: enable mute led on hp laptop 14-fq0xxx (git-fixes).\n- alsa: hda/realtek: fix mute/micmute led for hp mt645 (git-fixes).\n- alsa: hda/realtek: fix mute/micmute leds for hp zbook power (git-fixes).\n- alsa: hda/realtek: fix the external mic not being recognised for acer swift 1 sf114-32 (git-fixes).\n- alsa: usb-audio: add a quirk for yamaha yit-w12tx transmitter (git-fixes).\n- alsa: usb-audio: add delay quirk for motu m series 2nd revision (git-fixes).\n- alsa: usb-audio: add quirk for rode nt-usb+ (git-fixes).\n- alsa: usb-audio: check presence of valid altsetting control (git-fixes).\n- alsa: usb-audio: ignore clock selector errors for single connection (git-fixes).\n- alsa: usb-audio: more relaxed check of midi jack names (git-fixes).\n- alsa: usb-audio: sort quirk table entries (git-fixes).\n- arm64: entry: fix arm64_workaround_speculative_unpriv_load (bsc#1219443)\n- arm64: entry: preserve/restore x29 even for compat tasks (bsc#1219443)\n- arm64: entry: simplify tramp_alias macro and tramp_exit routine (bsc#1219443)\n- arm64: errata: add cortex-a510 speculative unprivileged load (bsc#1219443) enable workaround.\n- arm64: errata: add cortex-a520 speculative unprivileged load (bsc#1219443) enable workaround without kabi break.\n- arm64: errata: mitigate ampere1 erratum ac03_cpu_38 at stage-2 (git-fixes) enable ampere_erratum_ac03_cpu_38 workaround without kabi break\n- arm64: irq: set the correct node for shadow call stack (git-fixes)\n- arm64: irq: set the correct node for vmap stack (git-fixes)\n- arm64: rename arm64_workaround_2966298 (bsc#1219443)\n- arm64: subscribe microsoft azure cobalt 100 to arm neoverse n2 errata (git-fixes)\n- asoc: doc: fix undefined snd_soc_dapm_nopm argument (git-fixes).\n- asoc: rt5645: fix deadlock in rt5645_jack_detect_work() (git-fixes).\n- asoc: sof: ipc3: fix message bounds on ipc ops (git-fixes).\n- asoc: sunxi: sun4i-spdif: add support for allwinner h616 (git-fixes).\n- atm: idt77252: fix a memleak in open_card_ubr0 (git-fixes).\n- bluetooth: avoid potential use-after-free in hci_error_reset (git-fixes).\n- bluetooth: enforce validation on max value of connection interval (git-fixes).\n- bluetooth: hci_event: fix handling of hci_ev_io_capa_request (git-fixes).\n- bluetooth: hci_event: fix wrongly recorded wakeup bd_addr (git-fixes).\n- bluetooth: hci_sync: check the correct flag before starting a scan (git-fixes).\n- bluetooth: hci_sync: fix accept_list when attempting to suspend (git-fixes).\n- bluetooth: l2cap: fix possible multiple reject send (git-fixes).\n- bluetooth: qca: fix wrong event type for patch config command (git-fixes).\n- bpf: fix verification of indirect var-off stack access (git-fixes).\n- bpf: guard stack limits against 32bit overflow (git-fixes).\n- bpf: minor logging improvement (bsc#1220257).\n- bus: moxtet: add spi device table (git-fixes).\n- cachefiles: fix memory leak in cachefiles_add_cache() (bsc#1220267).\n- can: j1939: fix uaf in j1939_sk_match_filter during setsockopt(so_j1939_filter) (git-fixes).\n- crypto: api - disallow identical driver names (git-fixes).\n- crypto: ccp - fix null pointer dereference in __sev_platform_shutdown_locked (git-fixes).\n- crypto: octeontx2 - fix cptvf driver cleanup (git-fixes).\n- crypto: stm32/crc32 - fix parsing list of devices (git-fixes).\n- dmaengine: fsl-qdma: fix a memory leak related to the queue command dma (git-fixes).\n- dmaengine: fsl-qdma: fix soc may hang on 16 byte unaligned read (git-fixes).\n- dmaengine: fsl-qdma: increase size of \u0027irq_name\u0027 (git-fixes).\n- dmaengine: fsl-qdma: init irq after reg initialization (git-fixes).\n- dmaengine: ptdma: use consistent dma masks (git-fixes).\n- dmaengine: shdma: increase size of \u0027dev_id\u0027 (git-fixes).\n- dmaengine: ti: edma: add some null pointer checks to the edma_probe (git-fixes).\n- driver core: fix device_link_flag_is_sync_state_only() (git-fixes).\n- drm/amd/display: fix memory leak in dm_sw_fini() (git-fixes).\n- drm/amd/display: fix possible buffer overflow in \u0027find_dcfclk_for_voltage()\u0027 (git-fixes).\n- drm/amd/display: fix possible null dereference on device remove/driver unload (git-fixes).\n- drm/amd/display: increase frame-larger-than for all display_mode_vba files (git-fixes).\n- drm/amd/display: increased min_dcfclk_mhz and min_fclk_mhz (git-fixes).\n- drm/amd/display: preserve original aspect ratio in create stream (git-fixes).\n- drm/amdgpu/display: initialize gamma correction mode variable in dcn30_get_gamcor_current() (git-fixes).\n- drm/amdgpu: reset gpu for s3 suspend abort case (git-fixes).\n- drm/amdgpu: skip to program gfxdec registers for suspend abort (git-fixes).\n- drm/buddy: fix range bias (git-fixes).\n- drm/crtc: fix uninitialized variable use even harder (git-fixes).\n- drm/i915/gvt: fix uninitialized variable in handle_mmio() (git-fixes).\n- drm/msm/dp: return correct colorimetry for dp_test_dynamic_range_cea case (git-fixes).\n- drm/msm/dpu: check for valid hw_pp in dpu_encoder_helper_phys_cleanup (git-fixes).\n- drm/msms/dp: fixed link clock divider bits be over written in bpc unknown case (git-fixes).\n- drm/prime: support page array \u003e= 4gb (git-fixes).\n- drm/syncobj: call drm_syncobj_fence_add_wait when wait_available flag is set (git-fixes).\n- drm/ttm: fix an invalid freeing on already freed page in error path (git-fixes).\n- drop bcm5974 input patch causing a regression (bsc#1220030)\n- efi/capsule-loader: fix incorrect allocation size (git-fixes).\n- efi: do not add memblocks for soft-reserved memory (git-fixes).\n- efi: runtime: fix potential overflow of soft-reserved region size (git-fixes).\n- fbcon: always restore the old font data in fbcon_do_set_font() (git-fixes).\n- fbdev: savage: error out if pixclock equals zero (git-fixes).\n- fbdev: sis: error out if pixclock equals zero (git-fixes).\n- firewire: core: send bus reset promptly on gap count error (git-fixes).\n- fs: dlm: fix build with config_ipv6 disabled (git-fixes).\n- fs:jfs:ubsan:array-index-out-of-bounds in dbadjtree (git-fixes).\n- gpio: 74x164: enable output pins after registers are reset (git-fixes).\n- gpio: fix resource unwinding order in error path (git-fixes).\n- gpiolib: acpi: ignore touchpad wakeup on gpd g1619-04 (git-fixes).\n- gpiolib: fix the error path order in gpiochip_add_data_with_key() (git-fixes).\n- hid: apple: add 2021 magic keyboard fn key mapping (git-fixes).\n- hid: apple: add support for the 2021 magic keyboard (git-fixes).\n- hid: wacom: do not register input devices until after hid_hw_start (git-fixes).\n- hid: wacom: generic: avoid reporting a serial of \u00270\u0027 to userspace (git-fixes).\n- hwmon: (aspeed-pwm-tacho) mutex for tach reading (git-fixes).\n- hwmon: (coretemp) enlarge per package core count limit (git-fixes).\n- hwmon: (coretemp) fix bogus core_id to attr name mapping (git-fixes).\n- hwmon: (coretemp) fix out-of-bounds memory access (git-fixes).\n- i2c: i801: fix block process call transactions (git-fixes).\n- i2c: i801: remove i801_set_block_buffer_mode (git-fixes).\n- i2c: imx: add timer for handling the stop condition (git-fixes).\n- i2c: imx: when being a target, mark the last read as processed (git-fixes).\n- i3c: master: cdns: update maximum prescaler value for i2c clock (git-fixes).\n- ib/hfi1: fix a memleak in init_credit_return (git-fixes)\n- ib/hfi1: fix sdma.h tx-\u003enum_descs off-by-one error (git-fixes)\n- iio: accel: bma400: fix a compilation problem (git-fixes).\n- iio: adc: ad7091r: set alert bit in config register (git-fixes).\n- iio: core: fix memleak in iio_device_register_sysfs (git-fixes).\n- iio: hid-sensor-als: return 0 for hid_usage_sensor_time_timestamp (git-fixes).\n- iio: magnetometer: rm3100: add boundary check for the value read from rm3100_reg_tmrc (git-fixes).\n- input: iqs269a - switch to define_simple_dev_pm_ops() and pm_sleep_ptr() (git-fixes).\n- input: xpad - add lenovo legion go controllers (git-fixes).\n- irqchip/irq-brcmstb-l2: add write memory barrier before exit (git-fixes).\n- jfs: fix array-index-out-of-bounds in dbadjtree (git-fixes).\n- jfs: fix array-index-out-of-bounds in dinewext (git-fixes).\n- jfs: fix slab-out-of-bounds read in dtsearch (git-fixes).\n- jfs: fix uaf in jfs_evict_inode (git-fixes).\n- kbuild: fix changing elf file type for output of gen_btf for big endian (git-fixes).\n- kvm: s390: fix cc for successful pqap (git-fixes bsc#1219839).\n- kvm: s390: fix setting of fpc register (git-fixes bsc#1220392).\n- kvm: s390: vsie: fix race during shadow creation (git-fixes bsc#1220393).\n- kvm: vmx: move verw closer to vmentry for mds mitigation (git-fixes).\n- kvm: vmx: use bt+jnc, i.e. eflags.cf to select vmresume vs. vmlaunch (git-fixes).\n- lan78xx: enable auto speed configuration for lan7850 if no eeprom is detected (git-fixes).\n- leds: trigger: panic: do not register panic notifier if creating the trigger failed (git-fixes).\n- lib/stackdepot: add depot_fetch_stack helper (jsc-ped#7423).\n- lib/stackdepot: add refcount for records (jsc-ped#7423).\n- lib/stackdepot: fix first entry having a 0-handle (jsc-ped#7423).\n- lib/stackdepot: move stack_record struct definition into the header (jsc-ped#7423).\n- libsubcmd: fix memory leak in uniq() (git-fixes).\n- media: ddbridge: fix an error code problem in ddb_probe (git-fixes).\n- media: ir_toy: fix a memleak in irtoy_tx (git-fixes).\n- media: rc: bpf attach/detach requires write permission (git-fixes).\n- media: rockchip: rga: fix swizzling for rgb formats (git-fixes).\n- media: stk1160: fixed high volume of stk1160_dbg messages (git-fixes).\n- mfd: syscon: fix null pointer dereference in of_syscon_register() (git-fixes).\n- mm,page_owner: display all stacks and their count (jsc-ped#7423).\n- mm,page_owner: filter out stacks by a threshold (jsc-ped#7423).\n- mm,page_owner: implement the tracking of the stacks count (jsc-ped#7423).\n- mm,page_owner: maintain own list of stack_records structs (jsc-ped#7423).\n- mm,page_owner: update documentation regarding page_owner_stacks (jsc-ped#7423).\n- mm/hwpoison: fix unpoison_memory() (bsc#1218663).\n- mm/hwpoison: mf_mutex for soft offline and unpoison (bsc#1218663).\n- mm/hwpoison: remove mf_msg_buddy_2nd and mf_msg_poisoned_huge (bsc#1218663).\n- mm: memory-failure: fix potential unexpected return value from unpoison_memory() (git-fixes).\n- mmc: core: fix emmc initialization with 1-bit bus connection (git-fixes).\n- mmc: core: use mrq.sbc in close-ended ffu (git-fixes).\n- mmc: mmc_spi: remove custom dma mapped buffers (git-fixes).\n- mmc: sdhci-xenon: add timeout for phy init complete (git-fixes).\n- mmc: sdhci-xenon: fix phy init clock stability (git-fixes).\n- mmc: slot-gpio: allow non-sleeping gpio ro (git-fixes).\n- modpost: trim leading spaces when processing source files list (git-fixes).\n- mtd: spinand: gigadevice: fix the get ecc status issue (git-fixes).\n- net: usb: dm9601: fix wrong return value in dm9601_mdio_read (git-fixes).\n- netfs, fscache: prevent oops in fscache_put_cache() (bsc#1220003).\n- nilfs2: fix data corruption in dsync block recovery for small block sizes (git-fixes).\n- nilfs2: replace warn_ons for invalid dat metadata block requests (git-fixes).\n- nouveau/svm: fix kvcalloc() argument order (git-fixes).\n- nouveau: fix function cast warnings (git-fixes).\n- ntfs: check overflow when iterating attr_records (git-fixes).\n- ntfs: fix use-after-free in ntfs_attr_find() (git-fixes).\n- nvme-fabrics: fix i/o connect error handling (git-fixes).\n- nvme-host: fix the updating of the firmware version (git-fixes).\n- pci/aer: decode requester id when no error info found (git-fixes).\n- pci: add no pm reset quirk for nvidia spectrum devices (git-fixes).\n- pci: add pci_header_type_mfd definition (bsc#1220021).\n- pci: fix 64gt/s effective data rate calculation (git-fixes).\n- pci: only override amd usb controller if required (git-fixes).\n- pci: switchtec: fix stdev_release() crash after surprise hot remove (git-fixes).\n- platform/x86: thinkpad_acpi: only update profile if successfully converted (git-fixes).\n- platform/x86: touchscreen_dmi: add info for the teclast x16 plus tablet (git-fixes).\n- platform/x86: touchscreen_dmi: allow partial (prefix) matches for acpi names (git-fixes).\n- pm: core: remove unnecessary (void *) conversions (git-fixes).\n- pm: runtime: have devm_pm_runtime_enable() handle pm_runtime_dont_use_autosuspend() (git-fixes).\n- pnp: acpi: fix fortify warning (git-fixes).\n- power: supply: bq27xxx-i2c: do not free non existing irq (git-fixes).\n- powerpc/64: set task pt_regs-\u003elink to the lr value on scv entry (bsc#1194869).\n- powerpc/powernv: fix fortify source warnings in opal-prd.c (bsc#1194869).\n- powerpc/pseries: add a clear modifier to ibm,pa/pi-features parser (bsc#1220348).\n- powerpc/pseries: rework lppaca_shared_proc() to avoid debug_preempt (bsc#1194869).\n- powerpc/pseries: set cpu_ftr_dbell according to ibm,pi-features (bsc#1220348).\n- powerpc/watchpoint: disable pagefaults when getting user instruction (bsc#1194869).\n- powerpc/watchpoints: annotate atomic context in more places (bsc#1194869).\n- powerpc/watchpoints: disable preemption in thread_change_pc() (bsc#1194869).\n- powerpc: add crtsavres.o to always-y instead of extra-y (bsc#1194869).\n- powerpc: do not include lppaca.h in paca.h (bsc#1194869).\n- pstore/ram: fix crash when setting number of cpus to an odd number (git-fixes).\n- ras/amd/atl: add mi300 row retirement support (jsc#ped-7618).\n- ras/amd/atl: fix bit overflow in denorm_addr_df4_np2() (git-fixes).\n- ras: introduce a fru memory poison manager (jsc#ped-7618).\n- rdma/bnxt_re: add a missing check in bnxt_qplib_query_srq (git-fixes)\n- rdma/bnxt_re: return error for srq resize (git-fixes)\n- rdma/core: fix uninit-value access in ib_get_eth_speed() (bsc#1219934).\n- rdma/core: get ib width and speed from netdev (bsc#1219934).\n- rdma/irdma: add ae for too many rnrs (git-fixes)\n- rdma/irdma: fix kasan issue with tasklet (git-fixes)\n- rdma/irdma: set the cq read threshold for gen 1 (git-fixes)\n- rdma/irdma: validate max_send_wr and max_recv_wr (git-fixes)\n- rdma/qedr: fix qedr_create_user_qp error flow (git-fixes)\n- rdma/srpt: fix function pointer cast warnings (git-fixes)\n- rdma/srpt: support specifying the srpt_service_guid parameter (git-fixes)\n- refresh patches.suse/dm_blk_ioctl-implement-path-failover-for-sg_io. (bsc#1216776, bsc#1220277)\n- regulator: core: only increment use_count when enable_count changes (git-fixes).\n- regulator: pwm-regulator: add validity checks in continuous .get_voltage (git-fixes).\n- revert \u0027drm/amd/display: increased min_dcfclk_mhz and min_fclk_mhz\u0027 (git-fixes).\n- revert \u0027drm/amd/pm: resolve reboot exception for si oland\u0027 (git-fixes).\n- revert \u0027drm/amd: flush any delayed gfxoff on suspend entry\u0027 (git-fixes).\n- rpm/kernel-binary.spec.in: install scripts/gdb when enabled in config (bsc#1219653) they are put into -devel subpackage. and a proper link to /usr/share/gdb/auto-load/ is created.\n- s390/qeth: fix potential loss of l3-ip@ in case of network issues (git-fixes bsc#1219840).\n- s390: use the correct count for __iowrite64_copy() (git-fixes bsc#1220317).\n- sched/membarrier: reduce the ability to hammer on sys_membarrier (git-fixes).\n- scsi: core: move scsi_host_busy() out of host lock for waking up eh handler (git-fixes).\n- scsi: core: move scsi_host_busy() out of host lock if it is for per-command (git-fixes).\n- scsi: fnic: move fnic_fnic_flush_tx() to a work queue (git-fixes bsc#1219141).\n- scsi: hisi_sas: prevent parallel flr and controller reset (git-fixes).\n- scsi: ibmvfc: limit max hw queues by num_online_cpus() (bsc#1220106).\n- scsi: ibmvfc: open-code reset loop for target reset (bsc#1220106).\n- scsi: isci: fix an error code problem in isci_io_request_build() (git-fixes).\n- scsi: lpfc: add condition to delete ndlp object after sending bls_rjt to an abts (bsc#1220021).\n- scsi: lpfc: allow lpfc_plogi_confirm_nport() logic to execute for fabric nodes (bsc#1220021).\n- scsi: lpfc: change lpfc_vport fc_flag member into a bitmask (bsc#1220021).\n- scsi: lpfc: change lpfc_vport load_flag member into a bitmask (bsc#1220021).\n- scsi: lpfc: change nlp state statistic counters into atomic_t (bsc#1220021).\n- scsi: lpfc: copyright updates for 14.4.0.0 patches (bsc#1220021).\n- scsi: lpfc: fix failure to delete vports when discovery is in progress (bsc#1220021).\n- scsi: lpfc: fix possible memory leak in lpfc_rcv_padisc() (bsc#1220021).\n- scsi: lpfc: initialize status local variable in lpfc_sli4_repost_sgl_list() (bsc#1220021).\n- scsi: lpfc: move handling of reset congestion statistics events (bsc#1220021).\n- scsi: lpfc: protect vport fc_nodes list with an explicit spin lock (bsc#1220021).\n- scsi: lpfc: remove d_id swap log message from trace event logger (bsc#1220021).\n- scsi: lpfc: remove nlp_rcv_plogi early return during rscn processing for ndlps (bsc#1220021).\n- scsi: lpfc: remove shost_lock protection for fc_host_port shost apis (bsc#1220021).\n- scsi: lpfc: replace deprecated strncpy() with strscpy() (bsc#1220021).\n- scsi: lpfc: save fpin frequency statistics upon receipt of peer cgn notifications (bsc#1220021).\n- scsi: lpfc: update lpfc version to 14.4.0.0 (bsc#1220021).\n- scsi: lpfc: use pci_header_type_mfd instead of literal (bsc#1220021).\n- scsi: lpfc: use sg_dma_len() api to get struct scatterlist\u0027s length (bsc#1220021).\n- scsi: mpi3mr: refresh sdev queue depth after controller reset (git-fixes).\n- scsi: revert \u0027scsi: fcoe: fix potential deadlock on \u0026fip-\u003ectlr_lock\u0027 (git-fixes bsc#1219141).\n- serial: 8250: remove serial_rs485 sanitization from em485 (git-fixes).\n- spi-mxs: fix chipselect glitch (git-fixes).\n- spi: hisi-sfc-v3xx: return irq_none if no interrupts were detected (git-fixes).\n- spi: ppc4xx: drop write-only variable (git-fixes).\n- spi: sh-msiof: avoid integer overflow in constants (git-fixes).\n- staging: iio: ad5933: fix type mismatch regression (git-fixes).\n- supported.conf: remove external flag from ibm supported modules. (bsc#1209412)\n- tcp: fix tcp_mtup_probe_success vs wrong snd_cwnd (bsc#1218450).\n- tomoyo: fix uaf write bug in tomoyo_write_control() (git-fixes).\n- topology/sysfs: add format parameter to macro defining \u0027show\u0027 functions for proc (jsc#ped-7618).\n- topology/sysfs: add ppin in sysfs under cpu topology (jsc#ped-7618).\n- tty: allow tiocslcktrmios with cap_checkpoint_restore (git-fixes).\n- ubsan: array-index-out-of-bounds in dtsplitroot (git-fixes).\n- usb: cdns3: fix memory double free when handle zero packet (git-fixes).\n- usb: cdns3: fixed memory use after free at cdns3_gadget_ep_disable() (git-fixes).\n- usb: cdns3: modify the return value of cdns_set_active () to void when config_pm_sleep is disabled (git-fixes).\n- usb: cdns3: put the cdns set active part outside the spin lock (git-fixes).\n- usb: cdns: readd old api (git-fixes).\n- usb: cdnsp: blocked some cdns3 specific code (git-fixes).\n- usb: cdnsp: fixed issue with incorrect detecting cdnsp family controllers (git-fixes).\n- usb: dwc3: gadget: do not disconnect if not started (git-fixes).\n- usb: dwc3: gadget: handle ep0 request dequeuing properly (git-fixes).\n- usb: dwc3: gadget: ignore end transfer delay on teardown (git-fixes).\n- usb: dwc3: gadget: queue pm runtime idle on disconnect event (git-fixes).\n- usb: dwc3: gadget: refactor ep0 forced stall/restart into a separate api (git-fixes).\n- usb: dwc3: gadget: submit endxfer command if delayed during disconnect (git-fixes).\n- usb: dwc3: host: set xhci_sg_trb_cache_size_quirk (git-fixes).\n- usb: f_mass_storage: forbid async queue when shutdown happen (git-fixes).\n- usb: gadget: core: add missing kerneldoc for vbus_work (git-fixes).\n- usb: gadget: core: adjust uevent timing on gadget unbind (git-fixes).\n- usb: gadget: core: help prevent panic during uvc unconfigure (git-fixes).\n- usb: gadget: core: remove unbalanced mutex_unlock in usb_gadget_activate (git-fixes).\n- usb: gadget: f_hid: fix report descriptor allocation (git-fixes).\n- usb: gadget: fix obscure lockdep violation for udc_mutex (git-fixes).\n- usb: gadget: fix use-after-free read in usb_udc_uevent() (git-fixes).\n- usb: gadget: fsl_qe_udc: validate endpoint index for ch9 udc (git-fixes).\n- usb: gadget: ncm: avoid dropping datagrams of properly parsed ntbs (git-fixes).\n- usb: gadget: udc: core: offload usb_udc_vbus_handler processing (git-fixes).\n- usb: gadget: udc: core: prevent soft_connect_store() race (git-fixes).\n- usb: gadget: udc: handle gadget_connect failure during bind operation (git-fixes).\n- usb: hub: check for alternate port before enabling a_alt_hnp_support (bsc#1218527).\n- usb: hub: replace hardcoded quirk value with bit() macro (git-fixes).\n- usb: roles: do not get/set_role() when usb_role_switch is unregistered (git-fixes).\n- usb: roles: fix null pointer issue when put module\u0027s reference (git-fixes).\n- usb: serial: cp210x: add id for imst im871a-usb (git-fixes).\n- usb: serial: option: add fibocom fm101-gl variant (git-fixes).\n- usb: serial: qcserial: add new usb-id for dell wireless dw5826e (git-fixes).\n- watchdog: it87_wdt: keep wdtctrl bit 3 unmodified for it8784/it8786 (git-fixes).\n- wifi: ath11k: fix registration of 6ghz-only phy without the full channel range (git-fixes).\n- wifi: ath9k: fix potential array-index-out-of-bounds read in ath9k_htc_txstatus() (git-fixes).\n- wifi: cfg80211: fix missing interfaces when dumping (git-fixes).\n- wifi: cfg80211: fix rcu dereference in __cfg80211_bss_update (git-fixes).\n- wifi: cfg80211: free beacon_ies when overridden from hidden bss (git-fixes).\n- wifi: iwlwifi: fix some error codes (git-fixes).\n- wifi: iwlwifi: mvm: avoid baid size integer overflow (git-fixes).\n- wifi: iwlwifi: uninitialized variable in iwl_acpi_get_ppag_table() (git-fixes).\n- wifi: mac80211: adding missing drv_mgd_complete_tx() call (git-fixes).\n- wifi: mac80211: fix race condition on enabling fast-xmit (git-fixes).\n- wifi: nl80211: reject iftype change with mesh id change (git-fixes).\n- wifi: rt2x00: restart beacon queue when hardware reset (git-fixes).\n- wifi: rtl8xxxu: add additional usb ids for rtl8192eu devices (git-fixes).\n- wifi: rtlwifi: rtl8723{be,ae}: using calculate_bit_shift() (git-fixes).\n- wifi: wext-core: fix -wstringop-overflow warning in ioctl_standard_iw_point() (git-fixes).\n- x86/asm: add _asm_rip() macro for x86-64 (%rip) suffix (git-fixes).\n- x86/bugs: add asm helpers for executing verw (git-fixes).\n- x86/bugs: use alternative() instead of mds_user_clear static key (git-fixes). also add mds_user_clear to kabi severities since it\u0027s strictly mitigation related so should be low risk.\n- x86/cpu: x86_feature_intel_ppin finally had a cpuid bit (jsc#ped-7618).\n- x86/entry_32: add verw just before userspace transition (git-fixes).\n- x86/entry_64: add verw just before userspace transition (git-fixes).\n- x86/mm: fix memory encryption features advertisement (bsc#1206453).\n- xfs: remove unused fields from struct xbtree_ifakeroot (git-fixes).\n- xfs: short circuit xfs_growfs_data_private() if delta is zero (git-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2024-910,SUSE-SLE-Micro-5.5-2024-910,SUSE-SLE-Module-Live-Patching-15-SP5-2024-910,SUSE-SLE-Module-RT-15-SP5-2024-910,openSUSE-SLE-15.5-2024-910",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_0910-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2024:0910-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20240910-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2024:0910-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html"
},
{
"category": "self",
"summary": "SUSE Bug 1194869",
"url": "https://bugzilla.suse.com/1194869"
},
{
"category": "self",
"summary": "SUSE Bug 1206453",
"url": "https://bugzilla.suse.com/1206453"
},
{
"category": "self",
"summary": "SUSE Bug 1209412",
"url": "https://bugzilla.suse.com/1209412"
},
{
"category": "self",
"summary": "SUSE Bug 1213456",
"url": "https://bugzilla.suse.com/1213456"
},
{
"category": "self",
"summary": "SUSE Bug 1216776",
"url": "https://bugzilla.suse.com/1216776"
},
{
"category": "self",
"summary": "SUSE Bug 1217927",
"url": "https://bugzilla.suse.com/1217927"
},
{
"category": "self",
"summary": "SUSE Bug 1218195",
"url": "https://bugzilla.suse.com/1218195"
},
{
"category": "self",
"summary": "SUSE Bug 1218216",
"url": "https://bugzilla.suse.com/1218216"
},
{
"category": "self",
"summary": "SUSE Bug 1218450",
"url": "https://bugzilla.suse.com/1218450"
},
{
"category": "self",
"summary": "SUSE Bug 1218527",
"url": "https://bugzilla.suse.com/1218527"
},
{
"category": "self",
"summary": "SUSE Bug 1218663",
"url": "https://bugzilla.suse.com/1218663"
},
{
"category": "self",
"summary": "SUSE Bug 1218915",
"url": "https://bugzilla.suse.com/1218915"
},
{
"category": "self",
"summary": "SUSE Bug 1219126",
"url": "https://bugzilla.suse.com/1219126"
},
{
"category": "self",
"summary": "SUSE Bug 1219127",
"url": "https://bugzilla.suse.com/1219127"
},
{
"category": "self",
"summary": "SUSE Bug 1219141",
"url": "https://bugzilla.suse.com/1219141"
},
{
"category": "self",
"summary": "SUSE Bug 1219146",
"url": "https://bugzilla.suse.com/1219146"
},
{
"category": "self",
"summary": "SUSE Bug 1219295",
"url": "https://bugzilla.suse.com/1219295"
},
{
"category": "self",
"summary": "SUSE Bug 1219443",
"url": "https://bugzilla.suse.com/1219443"
},
{
"category": "self",
"summary": "SUSE Bug 1219653",
"url": "https://bugzilla.suse.com/1219653"
},
{
"category": "self",
"summary": "SUSE Bug 1219827",
"url": "https://bugzilla.suse.com/1219827"
},
{
"category": "self",
"summary": "SUSE Bug 1219835",
"url": "https://bugzilla.suse.com/1219835"
},
{
"category": "self",
"summary": "SUSE Bug 1219839",
"url": "https://bugzilla.suse.com/1219839"
},
{
"category": "self",
"summary": "SUSE Bug 1219840",
"url": "https://bugzilla.suse.com/1219840"
},
{
"category": "self",
"summary": "SUSE Bug 1219934",
"url": "https://bugzilla.suse.com/1219934"
},
{
"category": "self",
"summary": "SUSE Bug 1220003",
"url": "https://bugzilla.suse.com/1220003"
},
{
"category": "self",
"summary": "SUSE Bug 1220009",
"url": "https://bugzilla.suse.com/1220009"
},
{
"category": "self",
"summary": "SUSE Bug 1220021",
"url": "https://bugzilla.suse.com/1220021"
},
{
"category": "self",
"summary": "SUSE Bug 1220030",
"url": "https://bugzilla.suse.com/1220030"
},
{
"category": "self",
"summary": "SUSE Bug 1220106",
"url": "https://bugzilla.suse.com/1220106"
},
{
"category": "self",
"summary": "SUSE Bug 1220140",
"url": "https://bugzilla.suse.com/1220140"
},
{
"category": "self",
"summary": "SUSE Bug 1220187",
"url": "https://bugzilla.suse.com/1220187"
},
{
"category": "self",
"summary": "SUSE Bug 1220238",
"url": "https://bugzilla.suse.com/1220238"
},
{
"category": "self",
"summary": "SUSE Bug 1220240",
"url": "https://bugzilla.suse.com/1220240"
},
{
"category": "self",
"summary": "SUSE Bug 1220241",
"url": "https://bugzilla.suse.com/1220241"
},
{
"category": "self",
"summary": "SUSE Bug 1220243",
"url": "https://bugzilla.suse.com/1220243"
},
{
"category": "self",
"summary": "SUSE Bug 1220250",
"url": "https://bugzilla.suse.com/1220250"
},
{
"category": "self",
"summary": "SUSE Bug 1220251",
"url": "https://bugzilla.suse.com/1220251"
},
{
"category": "self",
"summary": "SUSE Bug 1220253",
"url": "https://bugzilla.suse.com/1220253"
},
{
"category": "self",
"summary": "SUSE Bug 1220254",
"url": "https://bugzilla.suse.com/1220254"
},
{
"category": "self",
"summary": "SUSE Bug 1220255",
"url": "https://bugzilla.suse.com/1220255"
},
{
"category": "self",
"summary": "SUSE Bug 1220257",
"url": "https://bugzilla.suse.com/1220257"
},
{
"category": "self",
"summary": "SUSE Bug 1220267",
"url": "https://bugzilla.suse.com/1220267"
},
{
"category": "self",
"summary": "SUSE Bug 1220277",
"url": "https://bugzilla.suse.com/1220277"
},
{
"category": "self",
"summary": "SUSE Bug 1220317",
"url": "https://bugzilla.suse.com/1220317"
},
{
"category": "self",
"summary": "SUSE Bug 1220326",
"url": "https://bugzilla.suse.com/1220326"
},
{
"category": "self",
"summary": "SUSE Bug 1220328",
"url": "https://bugzilla.suse.com/1220328"
},
{
"category": "self",
"summary": "SUSE Bug 1220330",
"url": "https://bugzilla.suse.com/1220330"
},
{
"category": "self",
"summary": "SUSE Bug 1220335",
"url": "https://bugzilla.suse.com/1220335"
},
{
"category": "self",
"summary": "SUSE Bug 1220344",
"url": "https://bugzilla.suse.com/1220344"
},
{
"category": "self",
"summary": "SUSE Bug 1220348",
"url": "https://bugzilla.suse.com/1220348"
},
{
"category": "self",
"summary": "SUSE Bug 1220350",
"url": "https://bugzilla.suse.com/1220350"
},
{
"category": "self",
"summary": "SUSE Bug 1220364",
"url": "https://bugzilla.suse.com/1220364"
},
{
"category": "self",
"summary": "SUSE Bug 1220392",
"url": "https://bugzilla.suse.com/1220392"
},
{
"category": "self",
"summary": "SUSE Bug 1220393",
"url": "https://bugzilla.suse.com/1220393"
},
{
"category": "self",
"summary": "SUSE Bug 1220398",
"url": "https://bugzilla.suse.com/1220398"
},
{
"category": "self",
"summary": "SUSE Bug 1220409",
"url": "https://bugzilla.suse.com/1220409"
},
{
"category": "self",
"summary": "SUSE Bug 1220444",
"url": "https://bugzilla.suse.com/1220444"
},
{
"category": "self",
"summary": "SUSE Bug 1220457",
"url": "https://bugzilla.suse.com/1220457"
},
{
"category": "self",
"summary": "SUSE Bug 1220459",
"url": "https://bugzilla.suse.com/1220459"
},
{
"category": "self",
"summary": "SUSE Bug 1220649",
"url": "https://bugzilla.suse.com/1220649"
},
{
"category": "self",
"summary": "SUSE Bug 1220796",
"url": "https://bugzilla.suse.com/1220796"
},
{
"category": "self",
"summary": "SUSE Bug 1220825",
"url": "https://bugzilla.suse.com/1220825"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-25162 page",
"url": "https://www.suse.com/security/cve/CVE-2019-25162/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-46923 page",
"url": "https://www.suse.com/security/cve/CVE-2021-46923/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-46924 page",
"url": "https://www.suse.com/security/cve/CVE-2021-46924/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-46932 page",
"url": "https://www.suse.com/security/cve/CVE-2021-46932/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-28746 page",
"url": "https://www.suse.com/security/cve/CVE-2023-28746/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-5197 page",
"url": "https://www.suse.com/security/cve/CVE-2023-5197/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52340 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52340/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52429 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52429/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52439 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52439/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52443 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52443/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52445 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52445/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52447 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52447/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52448 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52448/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52449 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52449/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52451 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52451/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52452 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52452/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52456 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52456/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52457 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52457/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52463 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52463/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52464 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52464/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52475 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52475/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52478 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52478/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-6817 page",
"url": "https://www.suse.com/security/cve/CVE-2023-6817/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-0607 page",
"url": "https://www.suse.com/security/cve/CVE-2024-0607/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-1151 page",
"url": "https://www.suse.com/security/cve/CVE-2024-1151/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-23849 page",
"url": "https://www.suse.com/security/cve/CVE-2024-23849/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-23850 page",
"url": "https://www.suse.com/security/cve/CVE-2024-23850/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-23851 page",
"url": "https://www.suse.com/security/cve/CVE-2024-23851/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-25744 page",
"url": "https://www.suse.com/security/cve/CVE-2024-25744/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26585 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26585/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26586 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26589 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26589/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26591 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26591/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26593 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26593/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26595 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26595/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26598 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26598/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26602 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26602/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26603 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26603/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26622 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26622/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2024-03-15T12:43:00Z",
"generator": {
"date": "2024-03-15T12:43:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2024:0910-1",
"initial_release_date": "2024-03-15T12:43:00Z",
"revision_history": [
{
"date": "2024-03-15T12:43:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"product": {
"name": "kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"product_id": "kernel-devel-rt-5.14.21-150500.13.38.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"product": {
"name": "kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"product_id": "kernel-source-rt-5.14.21-150500.13.38.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"product": {
"name": "cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"product_id": "cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"product": {
"name": "dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"product_id": "dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"product": {
"name": "gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"product_id": "gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"product": {
"name": "kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"product_id": "kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-5.14.21-150500.13.38.1.x86_64",
"product": {
"name": "kernel-rt-5.14.21-150500.13.38.1.x86_64",
"product_id": "kernel-rt-5.14.21-150500.13.38.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"product": {
"name": "kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"product_id": "kernel-rt-devel-5.14.21-150500.13.38.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"product": {
"name": "kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"product_id": "kernel-rt-extra-5.14.21-150500.13.38.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"product": {
"name": "kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"product_id": "kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"product": {
"name": "kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"product_id": "kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"product": {
"name": "kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"product_id": "kernel-rt-optional-5.14.21-150500.13.38.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"product": {
"name": "kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"product_id": "kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"product": {
"name": "kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"product_id": "kernel-rt_debug-5.14.21-150500.13.38.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"product": {
"name": "kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"product_id": "kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"product": {
"name": "kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"product_id": "kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"product": {
"name": "kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"product_id": "kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"product": {
"name": "kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"product_id": "kernel-syms-rt-5.14.21-150500.13.38.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"product": {
"name": "kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"product_id": "kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"product": {
"name": "ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"product_id": "ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"product": {
"name": "reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"product_id": "reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.5",
"product": {
"name": "SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-micro:5.5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Real Time Module 15 SP5",
"product": {
"name": "SUSE Real Time Module 15 SP5",
"product_id": "SUSE Real Time Module 15 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-rt:15:sp5"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.5",
"product": {
"name": "openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-5.14.21-150500.13.38.1.x86_64 as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64"
},
"product_reference": "kernel-rt-5.14.21-150500.13.38.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-rt-5.14.21-150500.13.38.1.noarch as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch"
},
"product_reference": "kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64"
},
"product_reference": "kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64 as component of SUSE Real Time Module 15 SP5",
"product_id": "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64"
},
"product_reference": "cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64 as component of SUSE Real Time Module 15 SP5",
"product_id": "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64"
},
"product_reference": "dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64 as component of SUSE Real Time Module 15 SP5",
"product_id": "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64"
},
"product_reference": "gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-rt-5.14.21-150500.13.38.1.noarch as component of SUSE Real Time Module 15 SP5",
"product_id": "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch"
},
"product_reference": "kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"relates_to_product_reference": "SUSE Real Time Module 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-5.14.21-150500.13.38.1.x86_64 as component of SUSE Real Time Module 15 SP5",
"product_id": "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64"
},
"product_reference": "kernel-rt-5.14.21-150500.13.38.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-5.14.21-150500.13.38.1.x86_64 as component of SUSE Real Time Module 15 SP5",
"product_id": "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64"
},
"product_reference": "kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64 as component of SUSE Real Time Module 15 SP5",
"product_id": "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64"
},
"product_reference": "kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt_debug-5.14.21-150500.13.38.1.x86_64 as component of SUSE Real Time Module 15 SP5",
"product_id": "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64"
},
"product_reference": "kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64 as component of SUSE Real Time Module 15 SP5",
"product_id": "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64"
},
"product_reference": "kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64 as component of SUSE Real Time Module 15 SP5",
"product_id": "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64"
},
"product_reference": "kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-rt-5.14.21-150500.13.38.1.noarch as component of SUSE Real Time Module 15 SP5",
"product_id": "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch"
},
"product_reference": "kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"relates_to_product_reference": "SUSE Real Time Module 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-rt-5.14.21-150500.13.38.1.x86_64 as component of SUSE Real Time Module 15 SP5",
"product_id": "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64"
},
"product_reference": "kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64 as component of SUSE Real Time Module 15 SP5",
"product_id": "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64"
},
"product_reference": "ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64"
},
"product_reference": "cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64"
},
"product_reference": "dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64"
},
"product_reference": "gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-rt-5.14.21-150500.13.38.1.noarch as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch"
},
"product_reference": "kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-5.14.21-150500.13.38.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64"
},
"product_reference": "kernel-rt-5.14.21-150500.13.38.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-5.14.21-150500.13.38.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64"
},
"product_reference": "kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-extra-5.14.21-150500.13.38.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64"
},
"product_reference": "kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64"
},
"product_reference": "kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64"
},
"product_reference": "kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-optional-5.14.21-150500.13.38.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64"
},
"product_reference": "kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64"
},
"product_reference": "kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt_debug-5.14.21-150500.13.38.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64"
},
"product_reference": "kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64"
},
"product_reference": "kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64"
},
"product_reference": "kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64"
},
"product_reference": "kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-rt-5.14.21-150500.13.38.1.noarch as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch"
},
"product_reference": "kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-rt-5.14.21-150500.13.38.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64"
},
"product_reference": "kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64"
},
"product_reference": "kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64"
},
"product_reference": "ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
},
"product_reference": "reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-25162",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-25162"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ni2c: Fix a potential use after free\n\nFree the adap structure only after we are done using it.\nThis patch just moves the put_device() down a bit to avoid the\nuse after free.\n\n[wsa: added comment to the code, added Fixes tag]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-25162",
"url": "https://www.suse.com/security/cve/CVE-2019-25162"
},
{
"category": "external",
"summary": "SUSE Bug 1220409 for CVE-2019-25162",
"url": "https://bugzilla.suse.com/1220409"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-15T12:43:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-25162"
},
{
"cve": "CVE-2021-46923",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-46923"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs/mount_setattr: always cleanup mount_kattr\n\nMake sure that finish_mount_kattr() is called after mount_kattr was\nsuccesfully built in both the success and failure case to prevent\nleaking any references we took when we built it. We returned early if\npath lookup failed thereby risking to leak an additional reference we\ntook when building mount_kattr when an idmapped mount was requested.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-46923",
"url": "https://www.suse.com/security/cve/CVE-2021-46923"
},
{
"category": "external",
"summary": "SUSE Bug 1220457 for CVE-2021-46923",
"url": "https://bugzilla.suse.com/1220457"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-15T12:43:00Z",
"details": "low"
}
],
"title": "CVE-2021-46923"
},
{
"cve": "CVE-2021-46924",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-46924"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFC: st21nfca: Fix memory leak in device probe and remove\n\n\u0027phy-\u003epending_skb\u0027 is alloced when device probe, but forgot to free\nin the error handling path and remove path, this cause memory leak\nas follows:\n\nunreferenced object 0xffff88800bc06800 (size 512):\n comm \"8\", pid 11775, jiffies 4295159829 (age 9.032s)\n hex dump (first 32 bytes):\n 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\n 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\n backtrace:\n [\u003c00000000d66c09ce\u003e] __kmalloc_node_track_caller+0x1ed/0x450\n [\u003c00000000c93382b3\u003e] kmalloc_reserve+0x37/0xd0\n [\u003c000000005fea522c\u003e] __alloc_skb+0x124/0x380\n [\u003c0000000019f29f9a\u003e] st21nfca_hci_i2c_probe+0x170/0x8f2\n\nFix it by freeing \u0027pending_skb\u0027 in error and remove.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-46924",
"url": "https://www.suse.com/security/cve/CVE-2021-46924"
},
{
"category": "external",
"summary": "SUSE Bug 1220459 for CVE-2021-46924",
"url": "https://bugzilla.suse.com/1220459"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-15T12:43:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-46924"
},
{
"cve": "CVE-2021-46932",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-46932"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nInput: appletouch - initialize work before device registration\n\nSyzbot has reported warning in __flush_work(). This warning is caused by\nwork-\u003efunc == NULL, which means missing work initialization.\n\nThis may happen, since input_dev-\u003eclose() calls\ncancel_work_sync(\u0026dev-\u003ework), but dev-\u003ework initalization happens _after_\ninput_register_device() call.\n\nSo this patch moves dev-\u003ework initialization before registering input\ndevice",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-46932",
"url": "https://www.suse.com/security/cve/CVE-2021-46932"
},
{
"category": "external",
"summary": "SUSE Bug 1220444 for CVE-2021-46932",
"url": "https://bugzilla.suse.com/1220444"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-15T12:43:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-46932"
},
{
"cve": "CVE-2023-28746",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-28746"
}
],
"notes": [
{
"category": "general",
"text": "Information exposure through microarchitectural state after transient execution from some register files for some Intel(R) Atom(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-28746",
"url": "https://www.suse.com/security/cve/CVE-2023-28746"
},
{
"category": "external",
"summary": "SUSE Bug 1213456 for CVE-2023-28746",
"url": "https://bugzilla.suse.com/1213456"
},
{
"category": "external",
"summary": "SUSE Bug 1221323 for CVE-2023-28746",
"url": "https://bugzilla.suse.com/1221323"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-15T12:43:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-28746"
},
{
"cve": "CVE-2023-5197",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-5197"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free vulnerability in the Linux kernel\u0027s netfilter: nf_tables component can be exploited to achieve local privilege escalation.\n\nAddition and removal of rules from chain bindings within the same transaction causes leads to use-after-free.\n\nWe recommend upgrading past commit f15f29fd4779be8a418b66e9d52979bb6d6c2325.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-5197",
"url": "https://www.suse.com/security/cve/CVE-2023-5197"
},
{
"category": "external",
"summary": "SUSE Bug 1218216 for CVE-2023-5197",
"url": "https://bugzilla.suse.com/1218216"
},
{
"category": "external",
"summary": "SUSE Bug 1245974 for CVE-2023-5197",
"url": "https://bugzilla.suse.com/1245974"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-15T12:43:00Z",
"details": "important"
}
],
"title": "CVE-2023-5197"
},
{
"cve": "CVE-2023-52340",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52340"
}
],
"notes": [
{
"category": "general",
"text": "The IPv6 implementation in the Linux kernel before 6.3 has a net/ipv6/route.c max_size threshold that can be consumed easily, e.g., leading to a denial of service (network is unreachable errors) when IPv6 packets are sent in a loop via a raw socket.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52340",
"url": "https://www.suse.com/security/cve/CVE-2023-52340"
},
{
"category": "external",
"summary": "SUSE Bug 1219295 for CVE-2023-52340",
"url": "https://bugzilla.suse.com/1219295"
},
{
"category": "external",
"summary": "SUSE Bug 1219296 for CVE-2023-52340",
"url": "https://bugzilla.suse.com/1219296"
},
{
"category": "external",
"summary": "SUSE Bug 1224298 for CVE-2023-52340",
"url": "https://bugzilla.suse.com/1224298"
},
{
"category": "external",
"summary": "SUSE Bug 1224878 for CVE-2023-52340",
"url": "https://bugzilla.suse.com/1224878"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-15T12:43:00Z",
"details": "important"
}
],
"title": "CVE-2023-52340"
},
{
"cve": "CVE-2023-52429",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52429"
}
],
"notes": [
{
"category": "general",
"text": "dm_table_create in drivers/md/dm-table.c in the Linux kernel through 6.7.4 can attempt to (in alloc_targets) allocate more than INT_MAX bytes, and crash, because of a missing check for struct dm_ioctl.target_count.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52429",
"url": "https://www.suse.com/security/cve/CVE-2023-52429"
},
{
"category": "external",
"summary": "SUSE Bug 1219827 for CVE-2023-52429",
"url": "https://bugzilla.suse.com/1219827"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-15T12:43:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-52429"
},
{
"cve": "CVE-2023-52439",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52439"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nuio: Fix use-after-free in uio_open\n\ncore-1\t\t\t\tcore-2\n-------------------------------------------------------\nuio_unregister_device\t\tuio_open\n\t\t\t\tidev = idr_find()\ndevice_unregister(\u0026idev-\u003edev)\nput_device(\u0026idev-\u003edev)\nuio_device_release\n\t\t\t\tget_device(\u0026idev-\u003edev)\nkfree(idev)\nuio_free_minor(minor)\n\t\t\t\tuio_release\n\t\t\t\tput_device(\u0026idev-\u003edev)\n\t\t\t\tkfree(idev)\n-------------------------------------------------------\n\nIn the core-1 uio_unregister_device(), the device_unregister will kfree\nidev when the idev-\u003edev kobject ref is 1. But after core-1\ndevice_unregister, put_device and before doing kfree, the core-2 may\nget_device. Then:\n1. After core-1 kfree idev, the core-2 will do use-after-free for idev.\n2. When core-2 do uio_release and put_device, the idev will be double\n freed.\n\nTo address this issue, we can get idev atomic \u0026 inc idev reference with\nminor_lock.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52439",
"url": "https://www.suse.com/security/cve/CVE-2023-52439"
},
{
"category": "external",
"summary": "SUSE Bug 1220140 for CVE-2023-52439",
"url": "https://bugzilla.suse.com/1220140"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-15T12:43:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-52439"
},
{
"cve": "CVE-2023-52443",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52443"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\napparmor: avoid crash when parsed profile name is empty\n\nWhen processing a packed profile in unpack_profile() described like\n\n \"profile :ns::samba-dcerpcd /usr/lib*/samba/{,samba/}samba-dcerpcd {...}\"\n\na string \":samba-dcerpcd\" is unpacked as a fully-qualified name and then\npassed to aa_splitn_fqname().\n\naa_splitn_fqname() treats \":samba-dcerpcd\" as only containing a namespace.\nThus it returns NULL for tmpname, meanwhile tmpns is non-NULL. Later\naa_alloc_profile() crashes as the new profile name is NULL now.\n\ngeneral protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN NOPTI\nKASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007]\nCPU: 6 PID: 1657 Comm: apparmor_parser Not tainted 6.7.0-rc2-dirty #16\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.2-3-gd478f380-rebuilt.opensuse.org 04/01/2014\nRIP: 0010:strlen+0x1e/0xa0\nCall Trace:\n \u003cTASK\u003e\n ? strlen+0x1e/0xa0\n aa_policy_init+0x1bb/0x230\n aa_alloc_profile+0xb1/0x480\n unpack_profile+0x3bc/0x4960\n aa_unpack+0x309/0x15e0\n aa_replace_profiles+0x213/0x33c0\n policy_update+0x261/0x370\n profile_replace+0x20e/0x2a0\n vfs_write+0x2af/0xe00\n ksys_write+0x126/0x250\n do_syscall_64+0x46/0xf0\n entry_SYSCALL_64_after_hwframe+0x6e/0x76\n \u003c/TASK\u003e\n---[ end trace 0000000000000000 ]---\nRIP: 0010:strlen+0x1e/0xa0\n\nIt seems such behaviour of aa_splitn_fqname() is expected and checked in\nother places where it is called (e.g. aa_remove_profiles). Well, there\nis an explicit comment \"a ns name without a following profile is allowed\"\ninside.\n\nAFAICS, nothing can prevent unpacked \"name\" to be in form like\n\":samba-dcerpcd\" - it is passed from userspace.\n\nDeny the whole profile set replacement in such case and inform user with\nEPROTO and an explaining message.\n\nFound by Linux Verification Center (linuxtesting.org).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52443",
"url": "https://www.suse.com/security/cve/CVE-2023-52443"
},
{
"category": "external",
"summary": "SUSE Bug 1220240 for CVE-2023-52443",
"url": "https://bugzilla.suse.com/1220240"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-15T12:43:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-52443"
},
{
"cve": "CVE-2023-52445",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52445"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: pvrusb2: fix use after free on context disconnection\n\nUpon module load, a kthread is created targeting the\npvr2_context_thread_func function, which may call pvr2_context_destroy\nand thus call kfree() on the context object. However, that might happen\nbefore the usb hub_event handler is able to notify the driver. This\npatch adds a sanity check before the invalid read reported by syzbot,\nwithin the context disconnection call stack.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52445",
"url": "https://www.suse.com/security/cve/CVE-2023-52445"
},
{
"category": "external",
"summary": "SUSE Bug 1220241 for CVE-2023-52445",
"url": "https://bugzilla.suse.com/1220241"
},
{
"category": "external",
"summary": "SUSE Bug 1220315 for CVE-2023-52445",
"url": "https://bugzilla.suse.com/1220315"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-15T12:43:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-52445"
},
{
"cve": "CVE-2023-52447",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52447"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Defer the free of inner map when necessary\n\nWhen updating or deleting an inner map in map array or map htab, the map\nmay still be accessed by non-sleepable program or sleepable program.\nHowever bpf_map_fd_put_ptr() decreases the ref-counter of the inner map\ndirectly through bpf_map_put(), if the ref-counter is the last one\n(which is true for most cases), the inner map will be freed by\nops-\u003emap_free() in a kworker. But for now, most .map_free() callbacks\ndon\u0027t use synchronize_rcu() or its variants to wait for the elapse of a\nRCU grace period, so after the invocation of ops-\u003emap_free completes,\nthe bpf program which is accessing the inner map may incur\nuse-after-free problem.\n\nFix the free of inner map by invoking bpf_map_free_deferred() after both\none RCU grace period and one tasks trace RCU grace period if the inner\nmap has been removed from the outer map before. The deferment is\naccomplished by using call_rcu() or call_rcu_tasks_trace() when\nreleasing the last ref-counter of bpf map. The newly-added rcu_head\nfield in bpf_map shares the same storage space with work field to\nreduce the size of bpf_map.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52447",
"url": "https://www.suse.com/security/cve/CVE-2023-52447"
},
{
"category": "external",
"summary": "SUSE Bug 1220251 for CVE-2023-52447",
"url": "https://bugzilla.suse.com/1220251"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-15T12:43:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-52447"
},
{
"cve": "CVE-2023-52448",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52448"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ngfs2: Fix kernel NULL pointer dereference in gfs2_rgrp_dump\n\nSyzkaller has reported a NULL pointer dereference when accessing\nrgd-\u003erd_rgl in gfs2_rgrp_dump(). This can happen when creating\nrgd-\u003erd_gl fails in read_rindex_entry(). Add a NULL pointer check in\ngfs2_rgrp_dump() to prevent that.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52448",
"url": "https://www.suse.com/security/cve/CVE-2023-52448"
},
{
"category": "external",
"summary": "SUSE Bug 1220253 for CVE-2023-52448",
"url": "https://bugzilla.suse.com/1220253"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-15T12:43:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-52448"
},
{
"cve": "CVE-2023-52449",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52449"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmtd: Fix gluebi NULL pointer dereference caused by ftl notifier\n\nIf both ftl.ko and gluebi.ko are loaded, the notifier of ftl\ntriggers NULL pointer dereference when trying to access\n\u0027gluebi-\u003edesc\u0027 in gluebi_read().\n\nubi_gluebi_init\n ubi_register_volume_notifier\n ubi_enumerate_volumes\n ubi_notify_all\n gluebi_notify nb-\u003enotifier_call()\n gluebi_create\n mtd_device_register\n mtd_device_parse_register\n add_mtd_device\n blktrans_notify_add not-\u003eadd()\n ftl_add_mtd tr-\u003eadd_mtd()\n scan_header\n mtd_read\n mtd_read_oob\n mtd_read_oob_std\n gluebi_read mtd-\u003eread()\n gluebi-\u003edesc - NULL\n\nDetailed reproduction information available at the Link [1],\n\nIn the normal case, obtain gluebi-\u003edesc in the gluebi_get_device(),\nand access gluebi-\u003edesc in the gluebi_read(). However,\ngluebi_get_device() is not executed in advance in the\nftl_add_mtd() process, which leads to NULL pointer dereference.\n\nThe solution for the gluebi module is to run jffs2 on the UBI\nvolume without considering working with ftl or mtdblock [2].\nTherefore, this problem can be avoided by preventing gluebi from\ncreating the mtdblock device after creating mtd partition of the\ntype MTD_UBIVOLUME.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52449",
"url": "https://www.suse.com/security/cve/CVE-2023-52449"
},
{
"category": "external",
"summary": "SUSE Bug 1220238 for CVE-2023-52449",
"url": "https://bugzilla.suse.com/1220238"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-15T12:43:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-52449"
},
{
"cve": "CVE-2023-52451",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52451"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/pseries/memhp: Fix access beyond end of drmem array\n\ndlpar_memory_remove_by_index() may access beyond the bounds of the\ndrmem lmb array when the LMB lookup fails to match an entry with the\ngiven DRC index. When the search fails, the cursor is left pointing to\n\u0026drmem_info-\u003elmbs[drmem_info-\u003en_lmbs], which is one element past the\nlast valid entry in the array. The debug message at the end of the\nfunction then dereferences this pointer:\n\n pr_debug(\"Failed to hot-remove memory at %llx\\n\",\n lmb-\u003ebase_addr);\n\nThis was found by inspection and confirmed with KASAN:\n\n pseries-hotplug-mem: Attempting to hot-remove LMB, drc index 1234\n ==================================================================\n BUG: KASAN: slab-out-of-bounds in dlpar_memory+0x298/0x1658\n Read of size 8 at addr c000000364e97fd0 by task bash/949\n\n dump_stack_lvl+0xa4/0xfc (unreliable)\n print_report+0x214/0x63c\n kasan_report+0x140/0x2e0\n __asan_load8+0xa8/0xe0\n dlpar_memory+0x298/0x1658\n handle_dlpar_errorlog+0x130/0x1d0\n dlpar_store+0x18c/0x3e0\n kobj_attr_store+0x68/0xa0\n sysfs_kf_write+0xc4/0x110\n kernfs_fop_write_iter+0x26c/0x390\n vfs_write+0x2d4/0x4e0\n ksys_write+0xac/0x1a0\n system_call_exception+0x268/0x530\n system_call_vectored_common+0x15c/0x2ec\n\n Allocated by task 1:\n kasan_save_stack+0x48/0x80\n kasan_set_track+0x34/0x50\n kasan_save_alloc_info+0x34/0x50\n __kasan_kmalloc+0xd0/0x120\n __kmalloc+0x8c/0x320\n kmalloc_array.constprop.0+0x48/0x5c\n drmem_init+0x2a0/0x41c\n do_one_initcall+0xe0/0x5c0\n kernel_init_freeable+0x4ec/0x5a0\n kernel_init+0x30/0x1e0\n ret_from_kernel_user_thread+0x14/0x1c\n\n The buggy address belongs to the object at c000000364e80000\n which belongs to the cache kmalloc-128k of size 131072\n The buggy address is located 0 bytes to the right of\n allocated 98256-byte region [c000000364e80000, c000000364e97fd0)\n\n ==================================================================\n pseries-hotplug-mem: Failed to hot-remove memory at 0\n\nLog failed lookups with a separate message and dereference the\ncursor only when it points to a valid entry.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52451",
"url": "https://www.suse.com/security/cve/CVE-2023-52451"
},
{
"category": "external",
"summary": "SUSE Bug 1220250 for CVE-2023-52451",
"url": "https://bugzilla.suse.com/1220250"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-15T12:43:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-52451"
},
{
"cve": "CVE-2023-52452",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52452"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Fix accesses to uninit stack slots\n\nPrivileged programs are supposed to be able to read uninitialized stack\nmemory (ever since 6715df8d5) but, before this patch, these accesses\nwere permitted inconsistently. In particular, accesses were permitted\nabove state-\u003eallocated_stack, but not below it. In other words, if the\nstack was already \"large enough\", the access was permitted, but\notherwise the access was rejected instead of being allowed to \"grow the\nstack\". This undesired rejection was happening in two places:\n- in check_stack_slot_within_bounds()\n- in check_stack_range_initialized()\nThis patch arranges for these accesses to be permitted. A bunch of tests\nthat were relying on the old rejection had to change; all of them were\nchanged to add also run unprivileged, in which case the old behavior\npersists. One tests couldn\u0027t be updated - global_func16 - because it\ncan\u0027t run unprivileged for other reasons.\n\nThis patch also fixes the tracking of the stack size for variable-offset\nreads. This second fix is bundled in the same commit as the first one\nbecause they\u0027re inter-related. Before this patch, writes to the stack\nusing registers containing a variable offset (as opposed to registers\nwith fixed, known values) were not properly contributing to the\nfunction\u0027s needed stack size. As a result, it was possible for a program\nto verify, but then to attempt to read out-of-bounds data at runtime\nbecause a too small stack had been allocated for it.\n\nEach function tracks the size of the stack it needs in\nbpf_subprog_info.stack_depth, which is maintained by\nupdate_stack_depth(). For regular memory accesses, check_mem_access()\nwas calling update_state_depth() but it was passing in only the fixed\npart of the offset register, ignoring the variable offset. This was\nincorrect; the minimum possible value of that register should be used\ninstead.\n\nThis tracking is now fixed by centralizing the tracking of stack size in\ngrow_stack_state(), and by lifting the calls to grow_stack_state() to\ncheck_stack_access_within_bounds() as suggested by Andrii. The code is\nnow simpler and more convincingly tracks the correct maximum stack size.\ncheck_stack_range_initialized() can now rely on enough stack having been\nallocated for the access; this helps with the fix for the first issue.\n\nA few tests were changed to also check the stack depth computation. The\none that fails without this patch is verifier_var_off:stack_write_priv_vs_unpriv.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52452",
"url": "https://www.suse.com/security/cve/CVE-2023-52452"
},
{
"category": "external",
"summary": "SUSE Bug 1220257 for CVE-2023-52452",
"url": "https://bugzilla.suse.com/1220257"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-15T12:43:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-52452"
},
{
"cve": "CVE-2023-52456",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52456"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nserial: imx: fix tx statemachine deadlock\n\nWhen using the serial port as RS485 port, the tx statemachine is used to\ncontrol the RTS pin to drive the RS485 transceiver TX_EN pin. When the\nTTY port is closed in the middle of a transmission (for instance during\nuserland application crash), imx_uart_shutdown disables the interface\nand disables the Transmission Complete interrupt. afer that,\nimx_uart_stop_tx bails on an incomplete transmission, to be retriggered\nby the TC interrupt. This interrupt is disabled and therefore the tx\nstatemachine never transitions out of SEND. The statemachine is in\ndeadlock now, and the TX_EN remains low, making the interface useless.\n\nimx_uart_stop_tx now checks for incomplete transmission AND whether TC\ninterrupts are enabled before bailing to be retriggered. This makes sure\nthe state machine handling is reached, and is properly set to\nWAIT_AFTER_SEND.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52456",
"url": "https://www.suse.com/security/cve/CVE-2023-52456"
},
{
"category": "external",
"summary": "SUSE Bug 1220364 for CVE-2023-52456",
"url": "https://bugzilla.suse.com/1220364"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-15T12:43:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-52456"
},
{
"cve": "CVE-2023-52457",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52457"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nserial: 8250: omap: Don\u0027t skip resource freeing if pm_runtime_resume_and_get() failed\n\nReturning an error code from .remove() makes the driver core emit the\nlittle helpful error message:\n\n\tremove callback returned a non-zero value. This will be ignored.\n\nand then remove the device anyhow. So all resources that were not freed\nare leaked in this case. Skipping serial8250_unregister_port() has the\npotential to keep enough of the UART around to trigger a use-after-free.\n\nSo replace the error return (and with it the little helpful error\nmessage) by a more useful error message and continue to cleanup.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52457",
"url": "https://www.suse.com/security/cve/CVE-2023-52457"
},
{
"category": "external",
"summary": "SUSE Bug 1220350 for CVE-2023-52457",
"url": "https://bugzilla.suse.com/1220350"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-15T12:43:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-52457"
},
{
"cve": "CVE-2023-52463",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52463"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nefivarfs: force RO when remounting if SetVariable is not supported\n\nIf SetVariable at runtime is not supported by the firmware we never assign\na callback for that function. At the same time mount the efivarfs as\nRO so no one can call that. However, we never check the permission flags\nwhen someone remounts the filesystem as RW. As a result this leads to a\ncrash looking like this:\n\n$ mount -o remount,rw /sys/firmware/efi/efivars\n$ efi-updatevar -f PK.auth PK\n\n[ 303.279166] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000000\n[ 303.280482] Mem abort info:\n[ 303.280854] ESR = 0x0000000086000004\n[ 303.281338] EC = 0x21: IABT (current EL), IL = 32 bits\n[ 303.282016] SET = 0, FnV = 0\n[ 303.282414] EA = 0, S1PTW = 0\n[ 303.282821] FSC = 0x04: level 0 translation fault\n[ 303.283771] user pgtable: 4k pages, 48-bit VAs, pgdp=000000004258c000\n[ 303.284913] [0000000000000000] pgd=0000000000000000, p4d=0000000000000000\n[ 303.286076] Internal error: Oops: 0000000086000004 [#1] PREEMPT SMP\n[ 303.286936] Modules linked in: qrtr tpm_tis tpm_tis_core crct10dif_ce arm_smccc_trng rng_core drm fuse ip_tables x_tables ipv6\n[ 303.288586] CPU: 1 PID: 755 Comm: efi-updatevar Not tainted 6.3.0-rc1-00108-gc7d0c4695c68 #1\n[ 303.289748] Hardware name: Unknown Unknown Product/Unknown Product, BIOS 2023.04-00627-g88336918701d 04/01/2023\n[ 303.291150] pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n[ 303.292123] pc : 0x0\n[ 303.292443] lr : efivar_set_variable_locked+0x74/0xec\n[ 303.293156] sp : ffff800008673c10\n[ 303.293619] x29: ffff800008673c10 x28: ffff0000037e8000 x27: 0000000000000000\n[ 303.294592] x26: 0000000000000800 x25: ffff000002467400 x24: 0000000000000027\n[ 303.295572] x23: ffffd49ea9832000 x22: ffff0000020c9800 x21: ffff000002467000\n[ 303.296566] x20: 0000000000000001 x19: 00000000000007fc x18: 0000000000000000\n[ 303.297531] x17: 0000000000000000 x16: 0000000000000000 x15: 0000aaaac807ab54\n[ 303.298495] x14: ed37489f673633c0 x13: 71c45c606de13f80 x12: 47464259e219acf4\n[ 303.299453] x11: ffff000002af7b01 x10: 0000000000000003 x9 : 0000000000000002\n[ 303.300431] x8 : 0000000000000010 x7 : ffffd49ea8973230 x6 : 0000000000a85201\n[ 303.301412] x5 : 0000000000000000 x4 : ffff0000020c9800 x3 : 00000000000007fc\n[ 303.302370] x2 : 0000000000000027 x1 : ffff000002467400 x0 : ffff000002467000\n[ 303.303341] Call trace:\n[ 303.303679] 0x0\n[ 303.303938] efivar_entry_set_get_size+0x98/0x16c\n[ 303.304585] efivarfs_file_write+0xd0/0x1a4\n[ 303.305148] vfs_write+0xc4/0x2e4\n[ 303.305601] ksys_write+0x70/0x104\n[ 303.306073] __arm64_sys_write+0x1c/0x28\n[ 303.306622] invoke_syscall+0x48/0x114\n[ 303.307156] el0_svc_common.constprop.0+0x44/0xec\n[ 303.307803] do_el0_svc+0x38/0x98\n[ 303.308268] el0_svc+0x2c/0x84\n[ 303.308702] el0t_64_sync_handler+0xf4/0x120\n[ 303.309293] el0t_64_sync+0x190/0x194\n[ 303.309794] Code: ???????? ???????? ???????? ???????? (????????)\n[ 303.310612] ---[ end trace 0000000000000000 ]---\n\nFix this by adding a .reconfigure() function to the fs operations which\nwe can use to check the requested flags and deny anything that\u0027s not RO\nif the firmware doesn\u0027t implement SetVariable at runtime.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52463",
"url": "https://www.suse.com/security/cve/CVE-2023-52463"
},
{
"category": "external",
"summary": "SUSE Bug 1220328 for CVE-2023-52463",
"url": "https://bugzilla.suse.com/1220328"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-15T12:43:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-52463"
},
{
"cve": "CVE-2023-52464",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52464"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nEDAC/thunderx: Fix possible out-of-bounds string access\n\nEnabling -Wstringop-overflow globally exposes a warning for a common bug\nin the usage of strncat():\n\n drivers/edac/thunderx_edac.c: In function \u0027thunderx_ocx_com_threaded_isr\u0027:\n drivers/edac/thunderx_edac.c:1136:17: error: \u0027strncat\u0027 specified bound 1024 equals destination size [-Werror=stringop-overflow=]\n 1136 | strncat(msg, other, OCX_MESSAGE_SIZE);\n | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~\n ...\n 1145 | strncat(msg, other, OCX_MESSAGE_SIZE);\n ...\n 1150 | strncat(msg, other, OCX_MESSAGE_SIZE);\n\n ...\n\nApparently the author of this driver expected strncat() to behave the\nway that strlcat() does, which uses the size of the destination buffer\nas its third argument rather than the length of the source buffer. The\nresult is that there is no check on the size of the allocated buffer.\n\nChange it to strlcat().\n\n [ bp: Trim compiler output, fixup commit message. ]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52464",
"url": "https://www.suse.com/security/cve/CVE-2023-52464"
},
{
"category": "external",
"summary": "SUSE Bug 1220330 for CVE-2023-52464",
"url": "https://bugzilla.suse.com/1220330"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-15T12:43:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-52464"
},
{
"cve": "CVE-2023-52475",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52475"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nInput: powermate - fix use-after-free in powermate_config_complete\n\nsyzbot has found a use-after-free bug [1] in the powermate driver. This\nhappens when the device is disconnected, which leads to a memory free from\nthe powermate_device struct. When an asynchronous control message\ncompletes after the kfree and its callback is invoked, the lock does not\nexist anymore and hence the bug.\n\nUse usb_kill_urb() on pm-\u003econfig to cancel any in-progress requests upon\ndevice disconnection.\n\n[1] https://syzkaller.appspot.com/bug?extid=0434ac83f907a1dbdd1e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52475",
"url": "https://www.suse.com/security/cve/CVE-2023-52475"
},
{
"category": "external",
"summary": "SUSE Bug 1220649 for CVE-2023-52475",
"url": "https://bugzilla.suse.com/1220649"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-15T12:43:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-52475"
},
{
"cve": "CVE-2023-52478",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52478"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: logitech-hidpp: Fix kernel crash on receiver USB disconnect\n\nhidpp_connect_event() has *four* time-of-check vs time-of-use (TOCTOU)\nraces when it races with itself.\n\nhidpp_connect_event() primarily runs from a workqueue but it also runs\non probe() and if a \"device-connected\" packet is received by the hw\nwhen the thread running hidpp_connect_event() from probe() is waiting on\nthe hw, then a second thread running hidpp_connect_event() will be\nstarted from the workqueue.\n\nThis opens the following races (note the below code is simplified):\n\n1. Retrieving + printing the protocol (harmless race):\n\n\tif (!hidpp-\u003eprotocol_major) {\n\t\thidpp_root_get_protocol_version()\n\t\thidpp-\u003eprotocol_major = response.rap.params[0];\n\t}\n\nWe can actually see this race hit in the dmesg in the abrt output\nattached to rhbz#2227968:\n\n[ 3064.624215] logitech-hidpp-device 0003:046D:4071.0049: HID++ 4.5 device connected.\n[ 3064.658184] logitech-hidpp-device 0003:046D:4071.0049: HID++ 4.5 device connected.\n\nTesting with extra logging added has shown that after this the 2 threads\ntake turn grabbing the hw access mutex (send_mutex) so they ping-pong\nthrough all the other TOCTOU cases managing to hit all of them:\n\n2. Updating the name to the HIDPP name (harmless race):\n\n\tif (hidpp-\u003ename == hdev-\u003ename) {\n\t\t...\n\t\thidpp-\u003ename = new_name;\n\t}\n\n3. Initializing the power_supply class for the battery (problematic!):\n\nhidpp_initialize_battery()\n{\n if (hidpp-\u003ebattery.ps)\n return 0;\n\n\tprobe_battery(); /* Blocks, threads take turns executing this */\n\n\thidpp-\u003ebattery.desc.properties =\n\t\tdevm_kmemdup(dev, hidpp_battery_props, cnt, GFP_KERNEL);\n\n\thidpp-\u003ebattery.ps =\n\t\tdevm_power_supply_register(\u0026hidpp-\u003ehid_dev-\u003edev,\n\t\t\t\t\t \u0026hidpp-\u003ebattery.desc, cfg);\n}\n\n4. Creating delayed input_device (potentially problematic):\n\n\tif (hidpp-\u003edelayed_input)\n\t\treturn;\n\n\thidpp-\u003edelayed_input = hidpp_allocate_input(hdev);\n\nThe really big problem here is 3. Hitting the race leads to the following\nsequence:\n\n\thidpp-\u003ebattery.desc.properties =\n\t\tdevm_kmemdup(dev, hidpp_battery_props, cnt, GFP_KERNEL);\n\n\thidpp-\u003ebattery.ps =\n\t\tdevm_power_supply_register(\u0026hidpp-\u003ehid_dev-\u003edev,\n\t\t\t\t\t \u0026hidpp-\u003ebattery.desc, cfg);\n\n\t...\n\n\thidpp-\u003ebattery.desc.properties =\n\t\tdevm_kmemdup(dev, hidpp_battery_props, cnt, GFP_KERNEL);\n\n\thidpp-\u003ebattery.ps =\n\t\tdevm_power_supply_register(\u0026hidpp-\u003ehid_dev-\u003edev,\n\t\t\t\t\t \u0026hidpp-\u003ebattery.desc, cfg);\n\nSo now we have registered 2 power supplies for the same battery,\nwhich looks a bit weird from userspace\u0027s pov but this is not even\nthe really big problem.\n\nNotice how:\n\n1. This is all devm-maganaged\n2. The hidpp-\u003ebattery.desc struct is shared between the 2 power supplies\n3. hidpp-\u003ebattery.desc.properties points to the result from the second\n devm_kmemdup()\n\nThis causes a use after free scenario on USB disconnect of the receiver:\n1. The last registered power supply class device gets unregistered\n2. The memory from the last devm_kmemdup() call gets freed,\n hidpp-\u003ebattery.desc.properties now points to freed memory\n3. The first registered power supply class device gets unregistered,\n this involves sending a remove uevent to userspace which invokes\n power_supply_uevent() to fill the uevent data\n4. power_supply_uevent() uses hidpp-\u003ebattery.desc.properties which\n now points to freed memory leading to backtraces like this one:\n\nSep 22 20:01:35 eric kernel: BUG: unable to handle page fault for address: ffffb2140e017f08\n...\nSep 22 20:01:35 eric kernel: Workqueue: usb_hub_wq hub_event\nSep 22 20:01:35 eric kernel: RIP: 0010:power_supply_uevent+0xee/0x1d0\n...\nSep 22 20:01:35 eric kernel: ? asm_exc_page_fault+0x26/0x30\nSep 22 20:01:35 eric kernel: ? power_supply_uevent+0xee/0x1d0\nSep 22 20:01:35 eric kernel: ? power_supply_uevent+0x10d/0x1d0\nSep 22 20:01:35 eric kernel: dev_uevent+0x10f/0x2d0\nSep 22 20:01:35 eric kernel: kobject_uevent_env+0x291/0x680\nSep 22 20:01:35 eric kernel: \n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52478",
"url": "https://www.suse.com/security/cve/CVE-2023-52478"
},
{
"category": "external",
"summary": "SUSE Bug 1220796 for CVE-2023-52478",
"url": "https://bugzilla.suse.com/1220796"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-15T12:43:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-52478"
},
{
"cve": "CVE-2023-6817",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-6817"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free vulnerability in the Linux kernel\u0027s netfilter: nf_tables component can be exploited to achieve local privilege escalation.\n\nThe function nft_pipapo_walk did not skip inactive elements during set walk which could lead double deactivations of PIPAPO (Pile Packet Policies) elements, leading to use-after-free.\n\nWe recommend upgrading past commit 317eb9685095678f2c9f5a8189de698c5354316a.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-6817",
"url": "https://www.suse.com/security/cve/CVE-2023-6817"
},
{
"category": "external",
"summary": "SUSE Bug 1218195 for CVE-2023-6817",
"url": "https://bugzilla.suse.com/1218195"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-15T12:43:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-6817"
},
{
"cve": "CVE-2024-0607",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-0607"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Netfilter subsystem in the Linux kernel. The issue is in the nft_byteorder_eval() function, where the code iterates through a loop and writes to the `dst` array. On each iteration, 8 bytes are written, but `dst` is an array of u32, so each element only has space for 4 bytes. That means every iteration overwrites part of the previous element corrupting this array of u32. This flaw allows a local user to cause a denial of service or potentially break NetFilter functionality.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-0607",
"url": "https://www.suse.com/security/cve/CVE-2024-0607"
},
{
"category": "external",
"summary": "SUSE Bug 1218915 for CVE-2024-0607",
"url": "https://bugzilla.suse.com/1218915"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-15T12:43:00Z",
"details": "moderate"
}
],
"title": "CVE-2024-0607"
},
{
"cve": "CVE-2024-1151",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-1151"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was reported in the Open vSwitch sub-component in the Linux Kernel. The flaw occurs when a recursive operation of code push recursively calls into the code block. The OVS module does not validate the stack depth, pushing too many frames and causing a stack overflow. As a result, this can lead to a crash or other related issues.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-1151",
"url": "https://www.suse.com/security/cve/CVE-2024-1151"
},
{
"category": "external",
"summary": "SUSE Bug 1219835 for CVE-2024-1151",
"url": "https://bugzilla.suse.com/1219835"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-15T12:43:00Z",
"details": "moderate"
}
],
"title": "CVE-2024-1151"
},
{
"cve": "CVE-2024-23849",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-23849"
}
],
"notes": [
{
"category": "general",
"text": "In rds_recv_track_latency in net/rds/af_rds.c in the Linux kernel through 6.7.1, there is an off-by-one error for an RDS_MSG_RX_DGRAM_TRACE_MAX comparison, resulting in out-of-bounds access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-23849",
"url": "https://www.suse.com/security/cve/CVE-2024-23849"
},
{
"category": "external",
"summary": "SUSE Bug 1219127 for CVE-2024-23849",
"url": "https://bugzilla.suse.com/1219127"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-15T12:43:00Z",
"details": "moderate"
}
],
"title": "CVE-2024-23849"
},
{
"cve": "CVE-2024-23850",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-23850"
}
],
"notes": [
{
"category": "general",
"text": "In btrfs_get_root_ref in fs/btrfs/disk-io.c in the Linux kernel through 6.7.1, there can be an assertion failure and crash because a subvolume can be read out too soon after its root item is inserted upon subvolume creation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-23850",
"url": "https://www.suse.com/security/cve/CVE-2024-23850"
},
{
"category": "external",
"summary": "SUSE Bug 1219126 for CVE-2024-23850",
"url": "https://bugzilla.suse.com/1219126"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-15T12:43:00Z",
"details": "moderate"
}
],
"title": "CVE-2024-23850"
},
{
"cve": "CVE-2024-23851",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-23851"
}
],
"notes": [
{
"category": "general",
"text": "copy_params in drivers/md/dm-ioctl.c in the Linux kernel through 6.7.1 can attempt to allocate more than INT_MAX bytes, and crash, because of a missing param_kernel-\u003edata_size check. This is related to ctl_ioctl.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-23851",
"url": "https://www.suse.com/security/cve/CVE-2024-23851"
},
{
"category": "external",
"summary": "SUSE Bug 1219146 for CVE-2024-23851",
"url": "https://bugzilla.suse.com/1219146"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-15T12:43:00Z",
"details": "moderate"
}
],
"title": "CVE-2024-23851"
},
{
"cve": "CVE-2024-25744",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-25744"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 6.6.7, an untrusted VMM can trigger int80 syscall handling at any given point. This is related to arch/x86/coco/tdx/tdx.c and arch/x86/mm/mem_encrypt_amd.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-25744",
"url": "https://www.suse.com/security/cve/CVE-2024-25744"
},
{
"category": "external",
"summary": "SUSE Bug 1217927 for CVE-2024-25744",
"url": "https://bugzilla.suse.com/1217927"
},
{
"category": "external",
"summary": "SUSE Bug 1220314 for CVE-2024-25744",
"url": "https://bugzilla.suse.com/1220314"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-15T12:43:00Z",
"details": "important"
}
],
"title": "CVE-2024-25744"
},
{
"cve": "CVE-2024-26585",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26585"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntls: fix race between tx work scheduling and socket close\n\nSimilarly to previous commit, the submitting thread (recvmsg/sendmsg)\nmay exit as soon as the async crypto handler calls complete().\nReorder scheduling the work before calling complete().\nThis seems more logical in the first place, as it\u0027s\nthe inverse order of what the submitting thread will do.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26585",
"url": "https://www.suse.com/security/cve/CVE-2024-26585"
},
{
"category": "external",
"summary": "SUSE Bug 1220187 for CVE-2024-26585",
"url": "https://bugzilla.suse.com/1220187"
},
{
"category": "external",
"summary": "SUSE Bug 1220211 for CVE-2024-26585",
"url": "https://bugzilla.suse.com/1220211"
},
{
"category": "external",
"summary": "SUSE Bug 1224298 for CVE-2024-26585",
"url": "https://bugzilla.suse.com/1224298"
},
{
"category": "external",
"summary": "SUSE Bug 1224878 for CVE-2024-26585",
"url": "https://bugzilla.suse.com/1224878"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-15T12:43:00Z",
"details": "important"
}
],
"title": "CVE-2024-26585"
},
{
"cve": "CVE-2024-26586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26586"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmlxsw: spectrum_acl_tcam: Fix stack corruption\n\nWhen tc filters are first added to a net device, the corresponding local\nport gets bound to an ACL group in the device. The group contains a list\nof ACLs. In turn, each ACL points to a different TCAM region where the\nfilters are stored. During forwarding, the ACLs are sequentially\nevaluated until a match is found.\n\nOne reason to place filters in different regions is when they are added\nwith decreasing priorities and in an alternating order so that two\nconsecutive filters can never fit in the same region because of their\nkey usage.\n\nIn Spectrum-2 and newer ASICs the firmware started to report that the\nmaximum number of ACLs in a group is more than 16, but the layout of the\nregister that configures ACL groups (PAGT) was not updated to account\nfor that. It is therefore possible to hit stack corruption [1] in the\nrare case where more than 16 ACLs in a group are required.\n\nFix by limiting the maximum ACL group size to the minimum between what\nthe firmware reports and the maximum ACLs that fit in the PAGT register.\n\nAdd a test case to make sure the machine does not crash when this\ncondition is hit.\n\n[1]\nKernel panic - not syncing: stack-protector: Kernel stack is corrupted in: mlxsw_sp_acl_tcam_group_update+0x116/0x120\n[...]\n dump_stack_lvl+0x36/0x50\n panic+0x305/0x330\n __stack_chk_fail+0x15/0x20\n mlxsw_sp_acl_tcam_group_update+0x116/0x120\n mlxsw_sp_acl_tcam_group_region_attach+0x69/0x110\n mlxsw_sp_acl_tcam_vchunk_get+0x492/0xa20\n mlxsw_sp_acl_tcam_ventry_add+0x25/0xe0\n mlxsw_sp_acl_rule_add+0x47/0x240\n mlxsw_sp_flower_replace+0x1a9/0x1d0\n tc_setup_cb_add+0xdc/0x1c0\n fl_hw_replace_filter+0x146/0x1f0\n fl_change+0xc17/0x1360\n tc_new_tfilter+0x472/0xb90\n rtnetlink_rcv_msg+0x313/0x3b0\n netlink_rcv_skb+0x58/0x100\n netlink_unicast+0x244/0x390\n netlink_sendmsg+0x1e4/0x440\n ____sys_sendmsg+0x164/0x260\n ___sys_sendmsg+0x9a/0xe0\n __sys_sendmsg+0x7a/0xc0\n do_syscall_64+0x40/0xe0\n entry_SYSCALL_64_after_hwframe+0x63/0x6b",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26586",
"url": "https://www.suse.com/security/cve/CVE-2024-26586"
},
{
"category": "external",
"summary": "SUSE Bug 1220243 for CVE-2024-26586",
"url": "https://bugzilla.suse.com/1220243"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-15T12:43:00Z",
"details": "moderate"
}
],
"title": "CVE-2024-26586"
},
{
"cve": "CVE-2024-26589",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26589"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Reject variable offset alu on PTR_TO_FLOW_KEYS\n\nFor PTR_TO_FLOW_KEYS, check_flow_keys_access() only uses fixed off\nfor validation. However, variable offset ptr alu is not prohibited\nfor this ptr kind. So the variable offset is not checked.\n\nThe following prog is accepted:\n\n func#0 @0\n 0: R1=ctx() R10=fp0\n 0: (bf) r6 = r1 ; R1=ctx() R6_w=ctx()\n 1: (79) r7 = *(u64 *)(r6 +144) ; R6_w=ctx() R7_w=flow_keys()\n 2: (b7) r8 = 1024 ; R8_w=1024\n 3: (37) r8 /= 1 ; R8_w=scalar()\n 4: (57) r8 \u0026= 1024 ; R8_w=scalar(smin=smin32=0,\n smax=umax=smax32=umax32=1024,var_off=(0x0; 0x400))\n 5: (0f) r7 += r8\n mark_precise: frame0: last_idx 5 first_idx 0 subseq_idx -1\n mark_precise: frame0: regs=r8 stack= before 4: (57) r8 \u0026= 1024\n mark_precise: frame0: regs=r8 stack= before 3: (37) r8 /= 1\n mark_precise: frame0: regs=r8 stack= before 2: (b7) r8 = 1024\n 6: R7_w=flow_keys(smin=smin32=0,smax=umax=smax32=umax32=1024,var_off\n =(0x0; 0x400)) R8_w=scalar(smin=smin32=0,smax=umax=smax32=umax32=1024,\n var_off=(0x0; 0x400))\n 6: (79) r0 = *(u64 *)(r7 +0) ; R0_w=scalar()\n 7: (95) exit\n\nThis prog loads flow_keys to r7, and adds the variable offset r8\nto r7, and finally causes out-of-bounds access:\n\n BUG: unable to handle page fault for address: ffffc90014c80038\n [...]\n Call Trace:\n \u003cTASK\u003e\n bpf_dispatcher_nop_func include/linux/bpf.h:1231 [inline]\n __bpf_prog_run include/linux/filter.h:651 [inline]\n bpf_prog_run include/linux/filter.h:658 [inline]\n bpf_prog_run_pin_on_cpu include/linux/filter.h:675 [inline]\n bpf_flow_dissect+0x15f/0x350 net/core/flow_dissector.c:991\n bpf_prog_test_run_flow_dissector+0x39d/0x620 net/bpf/test_run.c:1359\n bpf_prog_test_run kernel/bpf/syscall.c:4107 [inline]\n __sys_bpf+0xf8f/0x4560 kernel/bpf/syscall.c:5475\n __do_sys_bpf kernel/bpf/syscall.c:5561 [inline]\n __se_sys_bpf kernel/bpf/syscall.c:5559 [inline]\n __x64_sys_bpf+0x73/0xb0 kernel/bpf/syscall.c:5559\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0x3f/0x110 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x63/0x6b\n\nFix this by rejecting ptr alu with variable offset on flow_keys.\nApplying the patch rejects the program with \"R7 pointer arithmetic\non flow_keys prohibited\".",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26589",
"url": "https://www.suse.com/security/cve/CVE-2024-26589"
},
{
"category": "external",
"summary": "SUSE Bug 1220255 for CVE-2024-26589",
"url": "https://bugzilla.suse.com/1220255"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-15T12:43:00Z",
"details": "moderate"
}
],
"title": "CVE-2024-26589"
},
{
"cve": "CVE-2024-26591",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26591"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Fix re-attachment branch in bpf_tracing_prog_attach\n\nThe following case can cause a crash due to missing attach_btf:\n\n1) load rawtp program\n2) load fentry program with rawtp as target_fd\n3) create tracing link for fentry program with target_fd = 0\n4) repeat 3\n\nIn the end we have:\n\n- prog-\u003eaux-\u003edst_trampoline == NULL\n- tgt_prog == NULL (because we did not provide target_fd to link_create)\n- prog-\u003eaux-\u003eattach_btf == NULL (the program was loaded with attach_prog_fd=X)\n- the program was loaded for tgt_prog but we have no way to find out which one\n\n BUG: kernel NULL pointer dereference, address: 0000000000000058\n Call Trace:\n \u003cTASK\u003e\n ? __die+0x20/0x70\n ? page_fault_oops+0x15b/0x430\n ? fixup_exception+0x22/0x330\n ? exc_page_fault+0x6f/0x170\n ? asm_exc_page_fault+0x22/0x30\n ? bpf_tracing_prog_attach+0x279/0x560\n ? btf_obj_id+0x5/0x10\n bpf_tracing_prog_attach+0x439/0x560\n __sys_bpf+0x1cf4/0x2de0\n __x64_sys_bpf+0x1c/0x30\n do_syscall_64+0x41/0xf0\n entry_SYSCALL_64_after_hwframe+0x6e/0x76\n\nReturn -EINVAL in this situation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26591",
"url": "https://www.suse.com/security/cve/CVE-2024-26591"
},
{
"category": "external",
"summary": "SUSE Bug 1220254 for CVE-2024-26591",
"url": "https://bugzilla.suse.com/1220254"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-15T12:43:00Z",
"details": "moderate"
}
],
"title": "CVE-2024-26591"
},
{
"cve": "CVE-2024-26593",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26593"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ni2c: i801: Fix block process call transactions\n\nAccording to the Intel datasheets, software must reset the block\nbuffer index twice for block process call transactions: once before\nwriting the outgoing data to the buffer, and once again before\nreading the incoming data from the buffer.\n\nThe driver is currently missing the second reset, causing the wrong\nportion of the block buffer to be read.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26593",
"url": "https://www.suse.com/security/cve/CVE-2024-26593"
},
{
"category": "external",
"summary": "SUSE Bug 1220009 for CVE-2024-26593",
"url": "https://bugzilla.suse.com/1220009"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-15T12:43:00Z",
"details": "moderate"
}
],
"title": "CVE-2024-26593"
},
{
"cve": "CVE-2024-26595",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26595"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmlxsw: spectrum_acl_tcam: Fix NULL pointer dereference in error path\n\nWhen calling mlxsw_sp_acl_tcam_region_destroy() from an error path after\nfailing to attach the region to an ACL group, we hit a NULL pointer\ndereference upon \u0027region-\u003egroup-\u003etcam\u0027 [1].\n\nFix by retrieving the \u0027tcam\u0027 pointer using mlxsw_sp_acl_to_tcam().\n\n[1]\nBUG: kernel NULL pointer dereference, address: 0000000000000000\n[...]\nRIP: 0010:mlxsw_sp_acl_tcam_region_destroy+0xa0/0xd0\n[...]\nCall Trace:\n mlxsw_sp_acl_tcam_vchunk_get+0x88b/0xa20\n mlxsw_sp_acl_tcam_ventry_add+0x25/0xe0\n mlxsw_sp_acl_rule_add+0x47/0x240\n mlxsw_sp_flower_replace+0x1a9/0x1d0\n tc_setup_cb_add+0xdc/0x1c0\n fl_hw_replace_filter+0x146/0x1f0\n fl_change+0xc17/0x1360\n tc_new_tfilter+0x472/0xb90\n rtnetlink_rcv_msg+0x313/0x3b0\n netlink_rcv_skb+0x58/0x100\n netlink_unicast+0x244/0x390\n netlink_sendmsg+0x1e4/0x440\n ____sys_sendmsg+0x164/0x260\n ___sys_sendmsg+0x9a/0xe0\n __sys_sendmsg+0x7a/0xc0\n do_syscall_64+0x40/0xe0\n entry_SYSCALL_64_after_hwframe+0x63/0x6b",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26595",
"url": "https://www.suse.com/security/cve/CVE-2024-26595"
},
{
"category": "external",
"summary": "SUSE Bug 1220344 for CVE-2024-26595",
"url": "https://bugzilla.suse.com/1220344"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-15T12:43:00Z",
"details": "moderate"
}
],
"title": "CVE-2024-26595"
},
{
"cve": "CVE-2024-26598",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26598"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache\n\nThere is a potential UAF scenario in the case of an LPI translation\ncache hit racing with an operation that invalidates the cache, such\nas a DISCARD ITS command. The root of the problem is that\nvgic_its_check_cache() does not elevate the refcount on the vgic_irq\nbefore dropping the lock that serializes refcount changes.\n\nHave vgic_its_check_cache() raise the refcount on the returned vgic_irq\nand add the corresponding decrement after queueing the interrupt.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26598",
"url": "https://www.suse.com/security/cve/CVE-2024-26598"
},
{
"category": "external",
"summary": "SUSE Bug 1220326 for CVE-2024-26598",
"url": "https://bugzilla.suse.com/1220326"
},
{
"category": "external",
"summary": "SUSE Bug 1221129 for CVE-2024-26598",
"url": "https://bugzilla.suse.com/1221129"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-15T12:43:00Z",
"details": "important"
}
],
"title": "CVE-2024-26598"
},
{
"cve": "CVE-2024-26602",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26602"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsched/membarrier: reduce the ability to hammer on sys_membarrier\n\nOn some systems, sys_membarrier can be very expensive, causing overall\nslowdowns for everything. So put a lock on the path in order to\nserialize the accesses to prevent the ability for this to be called at\ntoo high of a frequency and saturate the machine.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26602",
"url": "https://www.suse.com/security/cve/CVE-2024-26602"
},
{
"category": "external",
"summary": "SUSE Bug 1220398 for CVE-2024-26602",
"url": "https://bugzilla.suse.com/1220398"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-15T12:43:00Z",
"details": "moderate"
}
],
"title": "CVE-2024-26602"
},
{
"cve": "CVE-2024-26603",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26603"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86/fpu: Stop relying on userspace for info to fault in xsave buffer\n\nBefore this change, the expected size of the user space buffer was\ntaken from fx_sw-\u003exstate_size. fx_sw-\u003exstate_size can be changed\nfrom user-space, so it is possible construct a sigreturn frame where:\n\n * fx_sw-\u003exstate_size is smaller than the size required by valid bits in\n fx_sw-\u003exfeatures.\n * user-space unmaps parts of the sigrame fpu buffer so that not all of\n the buffer required by xrstor is accessible.\n\nIn this case, xrstor tries to restore and accesses the unmapped area\nwhich results in a fault. But fault_in_readable succeeds because buf +\nfx_sw-\u003exstate_size is within the still mapped area, so it goes back and\ntries xrstor again. It will spin in this loop forever.\n\nInstead, fault in the maximum size which can be touched by XRSTOR (taken\nfrom fpstate-\u003euser_size).\n\n[ dhansen: tweak subject / changelog ]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26603",
"url": "https://www.suse.com/security/cve/CVE-2024-26603"
},
{
"category": "external",
"summary": "SUSE Bug 1220335 for CVE-2024-26603",
"url": "https://bugzilla.suse.com/1220335"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-15T12:43:00Z",
"details": "moderate"
}
],
"title": "CVE-2024-26603"
},
{
"cve": "CVE-2024-26622",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26622"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntomoyo: fix UAF write bug in tomoyo_write_control()\n\nSince tomoyo_write_control() updates head-\u003ewrite_buf when write()\nof long lines is requested, we need to fetch head-\u003ewrite_buf after\nhead-\u003eio_sem is held. Otherwise, concurrent write() requests can\ncause use-after-free-write and double-free problems.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26622",
"url": "https://www.suse.com/security/cve/CVE-2024-26622"
},
{
"category": "external",
"summary": "SUSE Bug 1220825 for CVE-2024-26622",
"url": "https://bugzilla.suse.com/1220825"
},
{
"category": "external",
"summary": "SUSE Bug 1220828 for CVE-2024-26622",
"url": "https://bugzilla.suse.com/1220828"
},
{
"category": "external",
"summary": "SUSE Bug 1224298 for CVE-2024-26622",
"url": "https://bugzilla.suse.com/1224298"
},
{
"category": "external",
"summary": "SUSE Bug 1224878 for CVE-2024-26622",
"url": "https://bugzilla.suse.com/1224878"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.38.1.noarch",
"openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.38.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.38.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-15T12:43:00Z",
"details": "important"
}
],
"title": "CVE-2024-26622"
}
]
}
SUSE-SU-2024:0855-1
Vulnerability from csaf_suse - Published: 2024-03-12 19:46 - Updated: 2024-03-12 19:46Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise 15 SP5 Azure kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2023-6270: Fixed a use-after-free bug in aoecmd_cfg_pkts (bsc#1218562).\n- CVE-2023-52559: Fixed a bug by avoiding memory allocation in iommu_suspend (bsc#1220933).\n- CVE-2023-52462: Fixed a security check for attempt to corrupt spilled pointer (bsc#1220325).\n- CVE-2023-52467: Fixed a null pointer dereference in of_syscon_register (bsc#1220433).\n- CVE-2023-52463: Fixed null pointer dereference in efivarfs (bsc#1220328).\n- CVE-2023-52530: Fixed a potential key use-after-free in wifi mac80211 (bsc#1220930).\n- CVE-2024-26607: Fixed a probing race issue in sii902x: (bsc#1220736).\n- CVE-2024-26591: Fixed re-attachment branch in bpf_tracing_prog_attach (bsc#1220254).\n- CVE-2024-26589: Fixed out of bounds read due to variable offset alu on PTR_TO_FLOW_KEYS (bsc#1220255).\n- CVE-2024-26585: Fixed race between tx work scheduling and socket close (bsc#1220187).\n- CVE-2023-52340: Fixed ICMPv6 \u201cPacket Too Big\u201d packets force a DoS of the Linux kernel by forcing 100% CPU (bsc#1219295).\n- CVE-2024-0607: Fixed 64-bit load issue in nft_byteorder_eval() (bsc#1218915).\n- CVE-2023-6817: Fixed use-after-free in nft_pipapo_walk (bsc#1218195).\n- CVE-2024-26622: Fixed UAF write bug in tomoyo_write_control() (bsc#1220825).\n- CVE-2024-23850: Fixed double free of anonymous device after snapshot creation failure (bsc#1219126).\n- CVE-2023-52452: Fixed Fix accesses to uninit stack slots (bsc#1220257).\n- CVE-2023-52457: Fixed skipped resource freeing if pm_runtime_resume_and_get() failed (bsc#1220350).\n- CVE-2023-52456: Fixed tx statemachine deadlock (bsc#1220364).\n- CVE-2023-52451: Fixed access beyond end of drmem array (bsc#1220250).\n- CVE-2023-52447: Fixed map_fd_put_ptr() signature kABI workaround (bsc#1220251).\n- CVE-2023-52449: Fixed gluebi NULL pointer dereference caused by ftl notifier (bsc#1220238).\n- CVE-2021-46923: Fixed reference leakage in fs/mount_setattr (bsc#1220457).\n- CVE-2024-26598: Fixed potential UAF in LPI translation cache (bsc#1220326).\n- CVE-2024-26603: Fixed infinite loop via #PF handling (bsc#1220335).\n- CVE-2023-52445: Fixed use after free on context disconnection (bsc#1220241).\n- CVE-2023-52439: Fixed use-after-free in uio_open (bsc#1220140).\n- CVE-2023-52443: Fixed crash when parsed profile name is empty (bsc#1220240).\n- CVE-2024-26593: Fixed block process call transactions (bsc#1220009).\n- CVE-2024-26586: Fixed stack corruption (bsc#1220243).\n- CVE-2024-26595: Fixed NULL pointer dereference in error path (bsc#1220344).\n- CVE-2023-52464: Fixed possible out-of-bounds string access (bsc#1220330)\n- CVE-2023-52448: Fixed kernel NULL pointer dereference in gfs2_rgrp_dump (bsc#1220253).\n- CVE-2024-1151: Fixed unlimited number of recursions from action sets (bsc#1219835).\n- CVE-2023-5197: Fixed se-after-free due to addition and removal of rules from chain bindings within the same transaction (bsc#1218216).\n- CVE-2024-23849: Fixed array-index-out-of-bounds in rds_cmsg_recv (bsc#1219127).\n- CVE-2023-52429: Fixed potential DoS in dm_table_create in drivers/md/dm-table.c (bsc#1219827).\n- CVE-2024-23851: Fixed crash in copy_params in drivers/md/dm-ioctl.c (bsc#1219146).\n\nThe following non-security bugs were fixed:\n\n- ACPI: APEI: set memory failure flags as MF_ACTION_REQUIRED on synchronous events (git-fixes).\n- ACPI: button: Add lid disable DMI quirk for Nextbook Ares 8A (git-fixes).\n- ACPI: extlog: fix NULL pointer dereference check (git-fixes).\n- ACPI: resource: Add ASUS model S5402ZA to quirks (git-fixes).\n- ACPI: resource: Skip IRQ override on ASUS ExpertBook B1502CBA (git-fixes).\n- ACPI: resource: Skip IRQ override on Asus Expertbook B2402CBA (git-fixes).\n- ACPI: video: Add backlight=native DMI quirk for Apple iMac11,3 (git-fixes).\n- ACPI: video: Add backlight=native DMI quirk for Apple iMac12,1 and iMac12,2 (git-fixes).\n- ACPI: video: Add backlight=native DMI quirk for Lenovo ThinkPad X131e (3371 AMD version) (git-fixes).\n- ACPI: video: Add quirk for the Colorful X15 AT 23 Laptop (git-fixes).\n- afs: fix the usage of read_seqbegin_or_lock() in afs_find_server*() (git-fixes).\n- afs: fix the usage of read_seqbegin_or_lock() in afs_lookup_volume_rcu() (git-fixes).\n- afs: Hide silly-rename files from userspace (git-fixes).\n- afs: Increase buffer size in afs_update_volume_status() (git-fixes).\n- ahci: asm1166: correct count of reported ports (git-fixes).\n- ALSA: Drop leftover snd-rtctimer stuff from Makefile (git-fixes).\n- ALSA: firewire-lib: fix to check cycle continuity (git-fixes).\n- ALSA: hda/conexant: Add quirk for SWS JS201D (git-fixes).\n- ALSA: hda/realtek: Apply headset jack quirk for non-bass alc287 thinkpads (git-fixes).\n- ALSA: hda/realtek: cs35l41: Fix device ID / model name (git-fixes).\n- ALSA: hda/realtek: cs35l41: Fix order and duplicates in quirks table (git-fixes).\n- ALSA: hda/realtek: Enable headset mic on Vaio VJFE-ADL (git-fixes).\n- ALSA: hda/realtek: Enable Mute LED on HP Laptop 14-fq0xxx (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LED For HP mt645 (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs for HP ZBook Power (git-fixes).\n- ALSA: hda/realtek: Fix the external mic not being recognised for Acer Swift 1 SF114-32 (git-fixes).\n- ALSA: usb-audio: Add a quirk for Yamaha YIT-W12TX transmitter (git-fixes).\n- ALSA: usb-audio: Add delay quirk for MOTU M Series 2nd revision (git-fixes).\n- ALSA: usb-audio: add quirk for RODE NT-USB+ (git-fixes).\n- ALSA: usb-audio: Check presence of valid altsetting control (git-fixes).\n- ALSA: usb-audio: Ignore clock selector errors for single connection (git-fixes).\n- ALSA: usb-audio: More relaxed check of MIDI jack names (git-fixes).\n- ALSA: usb-audio: Sort quirk table entries (git-fixes).\n- arm64: entry: fix ARM64_WORKAROUND_SPECULATIVE_UNPRIV_LOAD (bsc#1219443)\n- arm64: entry: Preserve/restore X29 even for compat tasks (bsc#1219443)\n- arm64: entry: Simplify tramp_alias macro and tramp_exit routine (bsc#1219443)\n- arm64: errata: Add Cortex-A510 speculative unprivileged load (bsc#1219443) Enable workaround.\n- arm64: errata: Add Cortex-A520 speculative unprivileged load (bsc#1219443) Enable workaround without kABI break.\n- arm64: errata: Mitigate Ampere1 erratum AC03_CPU_38 at stage-2 (git-fixes) Enable AMPERE_ERRATUM_AC03_CPU_38 workaround without kABI break\n- arm64: irq: set the correct node for shadow call stack (git-fixes)\n- arm64: irq: set the correct node for VMAP stack (git-fixes)\n- arm64: Rename ARM64_WORKAROUND_2966298 (bsc#1219443)\n- arm64: Subscribe Microsoft Azure Cobalt 100 to ARM Neoverse N2 errata (git-fixes)\n- ASoC: doc: Fix undefined SND_SOC_DAPM_NOPM argument (git-fixes).\n- ASoC: rt5645: Fix deadlock in rt5645_jack_detect_work() (git-fixes).\n- ASoC: SOF: IPC3: fix message bounds on ipc ops (git-fixes).\n- ASoC: sunxi: sun4i-spdif: Add support for Allwinner H616 (git-fixes).\n- atm: idt77252: fix a memleak in open_card_ubr0 (git-fixes).\n- Bluetooth: Avoid potential use-after-free in hci_error_reset (git-fixes).\n- Bluetooth: Enforce validation on max value of connection interval (git-fixes).\n- Bluetooth: hci_event: Fix handling of HCI_EV_IO_CAPA_REQUEST (git-fixes).\n- Bluetooth: hci_event: Fix wrongly recorded wakeup BD_ADDR (git-fixes).\n- Bluetooth: hci_sync: Check the correct flag before starting a scan (git-fixes).\n- Bluetooth: hci_sync: Fix accept_list when attempting to suspend (git-fixes).\n- Bluetooth: L2CAP: Fix possible multiple reject send (git-fixes).\n- Bluetooth: qca: Fix wrong event type for patch config command (git-fixes).\n- bpf: Fix verification of indirect var-off stack access (git-fixes).\n- bpf: Fix verification of indirect var-off stack access (git-fixes).\n- bpf: Guard stack limits against 32bit overflow (git-fixes).\n- bpf: Guard stack limits against 32bit overflow (git-fixes).\n- bpf: Minor logging improvement (bsc#1220257).\n- bus: moxtet: Add spi device table (git-fixes).\n- cachefiles: fix memory leak in cachefiles_add_cache() (bsc#1220267).\n- can: j1939: Fix UAF in j1939_sk_match_filter during setsockopt(SO_J1939_FILTER) (git-fixes).\n- crypto: api - Disallow identical driver names (git-fixes).\n- crypto: ccp - Fix null pointer dereference in __sev_platform_shutdown_locked (git-fixes).\n- crypto: octeontx2 - Fix cptvf driver cleanup (git-fixes).\n- crypto: stm32/crc32 - fix parsing list of devices (git-fixes).\n- dmaengine: fsl-qdma: Fix a memory leak related to the queue command DMA (git-fixes).\n- dmaengine: fsl-qdma: fix SoC may hang on 16 byte unaligned read (git-fixes).\n- dmaengine: fsl-qdma: increase size of \u0027irq_name\u0027 (git-fixes).\n- dmaengine: fsl-qdma: init irq after reg initialization (git-fixes).\n- dmaengine: ptdma: use consistent DMA masks (git-fixes).\n- dmaengine: shdma: increase size of \u0027dev_id\u0027 (git-fixes).\n- dmaengine: ti: edma: Add some null pointer checks to the edma_probe (git-fixes).\n- driver core: Fix device_link_flag_is_sync_state_only() (git-fixes).\n- drm/amd/display: Fix memory leak in dm_sw_fini() (git-fixes).\n- drm/amd/display: Fix possible buffer overflow in \u0027find_dcfclk_for_voltage()\u0027 (git-fixes).\n- drm/amd/display: Fix possible NULL dereference on device remove/driver unload (git-fixes).\n- drm/amd/display: Increase frame-larger-than for all display_mode_vba files (git-fixes).\n- drm/amd/display: increased min_dcfclk_mhz and min_fclk_mhz (git-fixes).\n- drm/amd/display: Preserve original aspect ratio in create stream (git-fixes).\n- drm/amdgpu: reset gpu for s3 suspend abort case (git-fixes).\n- drm/amdgpu: skip to program GFXDEC registers for suspend abort (git-fixes).\n- drm/amdgpu/display: Initialize gamma correction mode variable in dcn30_get_gamcor_current() (git-fixes).\n- drm/buddy: fix range bias (git-fixes).\n- drm/crtc: fix uninitialized variable use even harder (git-fixes).\n- drm/i915/gvt: Fix uninitialized variable in handle_mmio() (git-fixes).\n- drm/msm/dp: return correct Colorimetry for DP_TEST_DYNAMIC_RANGE_CEA case (git-fixes).\n- drm/msm/dpu: check for valid hw_pp in dpu_encoder_helper_phys_cleanup (git-fixes).\n- drm/msms/dp: fixed link clock divider bits be over written in BPC unknown case (git-fixes).\n- drm/prime: Support page array \u003e= 4GB (git-fixes).\n- drm/syncobj: call drm_syncobj_fence_add_wait when WAIT_AVAILABLE flag is set (git-fixes).\n- drm/ttm: Fix an invalid freeing on already freed page in error path (git-fixes).\n- efi: Do not add memblocks for soft-reserved memory (git-fixes).\n- efi: runtime: Fix potential overflow of soft-reserved region size (git-fixes).\n- efi/capsule-loader: fix incorrect allocation size (git-fixes).\n- fbcon: always restore the old font data in fbcon_do_set_font() (git-fixes).\n- fbdev: savage: Error out if pixclock equals zero (git-fixes).\n- fbdev: sis: Error out if pixclock equals zero (git-fixes).\n- firewire: core: send bus reset promptly on gap count error (git-fixes).\n- fs: dlm: fix build with CONFIG_IPV6 disabled (git-fixes).\n- fs: JFS: UBSAN: array-index-out-of-bounds in dbAdjTree (git-fixes).\n- gpio: 74x164: Enable output pins after registers are reset (git-fixes).\n- gpio: fix resource unwinding order in error path (git-fixes).\n- gpiolib: acpi: Ignore touchpad wakeup on GPD G1619-04 (git-fixes).\n- gpiolib: Fix the error path order in gpiochip_add_data_with_key() (git-fixes).\n- HID: apple: Add 2021 magic keyboard FN key mapping (git-fixes).\n- HID: apple: Add support for the 2021 Magic Keyboard (git-fixes).\n- HID: wacom: Do not register input devices until after hid_hw_start (git-fixes).\n- HID: wacom: generic: Avoid reporting a serial of \u00270\u0027 to userspace (git-fixes).\n- hwmon: (aspeed-pwm-tacho) mutex for tach reading (git-fixes).\n- hwmon: (coretemp) Enlarge per package core count limit (git-fixes).\n- hwmon: (coretemp) Fix bogus core_id to attr name mapping (git-fixes).\n- hwmon: (coretemp) Fix out-of-bounds memory access (git-fixes).\n- i2c: i801: Fix block process call transactions (git-fixes).\n- i2c: i801: Remove i801_set_block_buffer_mode (git-fixes).\n- i2c: imx: Add timer for handling the stop condition (git-fixes).\n- i2c: imx: when being a target, mark the last read as processed (git-fixes).\n- i3c: master: cdns: Update maximum prescaler value for i2c clock (git-fixes).\n- IB/hfi1: Fix a memleak in init_credit_return (git-fixes)\n- IB/hfi1: Fix sdma.h tx-\u003enum_descs off-by-one error (git-fixes)\n- iio: accel: bma400: Fix a compilation problem (git-fixes).\n- iio: adc: ad7091r: Set alert bit in config register (git-fixes).\n- iio: core: fix memleak in iio_device_register_sysfs (git-fixes).\n- iio: hid-sensor-als: Return 0 for HID_USAGE_SENSOR_TIME_TIMESTAMP (git-fixes).\n- iio: magnetometer: rm3100: add boundary check for the value read from RM3100_REG_TMRC (git-fixes).\n- Input: i8042 - add Fujitsu Lifebook E5411 to i8042 quirk table (git-fixes).\n- Input: i8042 - add Fujitsu Lifebook U728 to i8042 quirk table (git-fixes).\n- Input: i8042 - add quirk for Fujitsu Lifebook A574/H (git-fixes).\n- Input: i8042 - fix strange behavior of touchpad on Clevo NS70PU (git-fixes).\n- Input: iqs269a - switch to DEFINE_SIMPLE_DEV_PM_OPS() and pm_sleep_ptr() (git-fixes).\n- Input: pm8941-powerkey - fix debounce on gen2+ PMICs (git-fixes).\n- Input: pm8941-pwrkey - add software key press debouncing support (git-fixes).\n- Input: pm8941-pwrkey - add support for PON GEN3 base addresses (git-fixes).\n- Input: xpad - add Lenovo Legion Go controllers (git-fixes).\n- Input: xpad - add Lenovo Legion Go controllers (git-fixes).\n- irqchip/gic-v3-its: Fix GICv4.1 VPE affinity update (git-fixes).\n- irqchip/irq-brcmstb-l2: Add write memory barrier before exit (git-fixes).\n- jfs: fix array-index-out-of-bounds in dbAdjTree (git-fixes).\n- jfs: fix array-index-out-of-bounds in diNewExt (git-fixes).\n- jfs: fix slab-out-of-bounds Read in dtSearch (git-fixes).\n- jfs: fix uaf in jfs_evict_inode (git-fixes).\n- kbuild: Fix changing ELF file type for output of gen_btf for big endian (git-fixes).\n- KVM: s390: fix cc for successful PQAP (git-fixes bsc#1219839).\n- KVM: s390: fix setting of fpc register (git-fixes bsc#1220392).\n- KVM: s390: vsie: fix race during shadow creation (git-fixes bsc#1220393).\n- KVM: VMX: Move VERW closer to VMentry for MDS mitigation (git-fixes).\n- KVM: VMX: Use BT+JNC, i.e. EFLAGS.CF to select VMRESUME vs. VMLAUNCH (git-fixes).\n- lan78xx: enable auto speed configuration for LAN7850 if no EEPROM is detected (git-commit).\n- lan78xx: enable auto speed configuration for LAN7850 if no EEPROM is detected (git-fixes).\n- leds: trigger: panic: Do not register panic notifier if creating the trigger failed (git-fixes).\n- lib/stackdepot: add depot_fetch_stack helper (jsc-PED#7423).\n- lib/stackdepot: add refcount for records (jsc-PED#7423).\n- lib/stackdepot: Fix first entry having a 0-handle (jsc-PED#7423).\n- lib/stackdepot: Move stack_record struct definition into the header (jsc-PED#7423).\n- libsubcmd: Fix memory leak in uniq() (git-fixes).\n- md: Do not ignore suspended array in md_check_recovery() (git-fixes).\n- md: do not leave \u0027MD_RECOVERY_FROZEN\u0027 in error path of md_set_readonly() (git-fixes).\n- md: introduce md_ro_state (git-fixes).\n- md: Make sure md_do_sync() will set MD_RECOVERY_DONE (git-fixes).\n- md: Whenassemble the array, consult the superblock of the freshest device (git-fixes).\n- md/raid10: check slab-out-of-bounds in md_bitmap_get_counter (git-fixes).\n- md/raid5: release batch_last before waiting for another stripe_head (git-fixes).\n- md/raid6: use valid sector values to determine if an I/O should wait on the reshape (git-fixes).\n- media: ddbridge: fix an error code problem in ddb_probe (git-fixes).\n- media: ir_toy: fix a memleak in irtoy_tx (git-fixes).\n- media: rc: bpf attach/detach requires write permission (git-fixes).\n- media: rockchip: rga: fix swizzling for RGB formats (git-fixes).\n- media: stk1160: Fixed high volume of stk1160_dbg messages (git-fixes).\n- mfd: syscon: Fix null pointer dereference in of_syscon_register() (git-fixes).\n- mm,page_owner: Display all stacks and their count (jsc-PED#7423).\n- mm,page_owner: Filter out stacks by a threshold (jsc-PED#7423).\n- mm,page_owner: Implement the tracking of the stacks count (jsc-PED#7423).\n- mm,page_owner: Maintain own list of stack_records structs (jsc-PED#7423).\n- mm,page_owner: Update Documentation regarding page_owner_stacks (jsc-PED#7423).\n- mm: memory-failure: fix potential unexpected return value from unpoison_memory() (git-fixes).\n- mm/hwpoison: fix unpoison_memory() (bsc#1218663).\n- mm/hwpoison: mf_mutex for soft offline and unpoison (bsc#1218663).\n- mm/hwpoison: remove MF_MSG_BUDDY_2ND and MF_MSG_POISONED_HUGE (bsc#1218663).\n- mmc: core: Fix eMMC initialization with 1-bit bus connection (git-fixes).\n- mmc: core: Use mrq.sbc in close-ended ffu (git-fixes).\n- mmc: mmc_spi: remove custom DMA mapped buffers (git-fixes).\n- mmc: sdhci-xenon: add timeout for PHY init complete (git-fixes).\n- mmc: sdhci-xenon: fix PHY init clock stability (git-fixes).\n- mmc: slot-gpio: Allow non-sleeping GPIO ro (git-fixes).\n- modpost: trim leading spaces when processing source files list (git-fixes).\n- mtd: spinand: gigadevice: Fix the get ecc status issue (git-fixes).\n- net: usb: dm9601: fix wrong return value in dm9601_mdio_read (git-fixes).\n- net: usb: dm9601: fix wrong return value in dm9601_mdio_read (git-fixes).\n- netfs, fscache: Prevent Oops in fscache_put_cache() (bsc#1220003).\n- nilfs2: fix data corruption in dsync block recovery for small block sizes (git-fixes).\n- nilfs2: replace WARN_ONs for invalid DAT metadata block requests (git-fixes).\n- nouveau: fix function cast warnings (git-fixes).\n- nouveau/svm: fix kvcalloc() argument order (git-fixes).\n- ntfs: check overflow when iterating ATTR_RECORDs (git-fixes).\n- ntfs: fix use-after-free in ntfs_attr_find() (git-fixes).\n- nvme-fabrics: fix I/O connect error handling (git-fixes).\n- nvme-host: fix the updating of the firmware version (git-fixes).\n- PCI: Add no PM reset quirk for NVIDIA Spectrum devices (git-fixes).\n- PCI: Add PCI_HEADER_TYPE_MFD definition (bsc#1220021).\n- PCI: Fix 64GT/s effective data rate calculation (git-fixes).\n- PCI: Only override AMD USB controller if required (git-fixes).\n- PCI: switchtec: Fix stdev_release() crash after surprise hot remove (git-fixes).\n- PCI/AER: Decode Requester ID when no error info found (git-fixes).\n- platform/x86: thinkpad_acpi: Only update profile if successfully converted (git-fixes).\n- platform/x86: touchscreen_dmi: Add info for the TECLAST X16 Plus tablet (git-fixes).\n- platform/x86: touchscreen_dmi: Allow partial (prefix) matches for ACPI names (git-fixes).\n- PM: core: Remove unnecessary (void *) conversions (git-fixes).\n- PM: runtime: Have devm_pm_runtime_enable() handle pm_runtime_dont_use_autosuspend() (git-fixes).\n- PNP: ACPI: fix fortify warning (git-fixes).\n- power: supply: bq27xxx-i2c: Do not free non existing IRQ (git-fixes).\n- powerpc: add crtsavres.o to always-y instead of extra-y (bsc#1194869).\n- powerpc: Do not include lppaca.h in paca.h (bsc#1194869).\n- powerpc/64: Set task pt_regs-\u003elink to the LR value on scv entry (bsc#1194869).\n- powerpc/powernv: Fix fortify source warnings in opal-prd.c (bsc#1194869).\n- powerpc/pseries: Add a clear modifier to ibm,pa/pi-features parser (bsc#1220348).\n- powerpc/pseries: Rework lppaca_shared_proc() to avoid DEBUG_PREEMPT (bsc#1194869).\n- powerpc/pseries: Set CPU_FTR_DBELL according to ibm,pi-features (bsc#1220348).\n- powerpc/watchpoint: Disable pagefaults when getting user instruction (bsc#1194869).\n- powerpc/watchpoints: Annotate atomic context in more places (bsc#1194869).\n- powerpc/watchpoints: Disable preemption in thread_change_pc() (bsc#1194869).\n- pstore/ram: Fix crash when setting number of cpus to an odd number (git-fixes).\n- RAS: Introduce a FRU memory poison manager (jsc#PED-7618).\n- RAS/AMD/ATL: Add MI300 row retirement support (jsc#PED-7618).\n- RAS/AMD/ATL: Fix bit overflow in denorm_addr_df4_np2() (git-fixes).\n- RDMA/bnxt_re: Add a missing check in bnxt_qplib_query_srq (git-fixes)\n- RDMA/bnxt_re: Return error for SRQ resize (git-fixes)\n- RDMA/core: Fix uninit-value access in ib_get_eth_speed() (bsc#1219934).\n- RDMA/core: Get IB width and speed from netdev (bsc#1219934).\n- RDMA/irdma: Add AE for too many RNRS (git-fixes)\n- RDMA/irdma: Fix KASAN issue with tasklet (git-fixes)\n- RDMA/irdma: Set the CQ read threshold for GEN 1 (git-fixes)\n- RDMA/irdma: Validate max_send_wr and max_recv_wr (git-fixes)\n- RDMA/qedr: Fix qedr_create_user_qp error flow (git-fixes)\n- RDMA/srpt: fix function pointer cast warnings (git-fixes)\n- RDMA/srpt: Support specifying the srpt_service_guid parameter (git-fixes)\n- regulator: core: Only increment use_count when enable_count changes (git-fixes).\n- regulator: pwm-regulator: Add validity checks in continuous .get_voltage (git-fixes).\n- Revert \u0027drm/amd: flush any delayed gfxoff on suspend entry\u0027 (git-fixes).\n- Revert \u0027drm/amd/display: increased min_dcfclk_mhz and min_fclk_mhz\u0027 (git-fixes).\n- Revert \u0027drm/amd/pm: resolve reboot exception for si oland\u0027 (git-fixes).\n- ring-buffer: Clean ring_buffer_poll_wait() error return (git-fixes).\n- s390: use the correct count for __iowrite64_copy() (git-fixes bsc#1220317).\n- s390/qeth: Fix potential loss of L3-IP@ in case of network issues (git-fixes bsc#1219840).\n- sched/membarrier: reduce the ability to hammer on sys_membarrier (git-fixes).\n- scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler (git-fixes).\n- scsi: core: Move scsi_host_busy() out of host lock if it is for per-command (git-fixes).\n- scsi: fnic: Move fnic_fnic_flush_tx() to a work queue (git-fixes bsc#1219141).\n- scsi: hisi_sas: Prevent parallel FLR and controller reset (git-fixes).\n- scsi: ibmvfc: Limit max hw queues by num_online_cpus() (bsc#1220106).\n- scsi: ibmvfc: Open-code reset loop for target reset (bsc#1220106).\n- scsi: isci: Fix an error code problem in isci_io_request_build() (git-fixes).\n- scsi: lpfc: Add condition to delete ndlp object after sending BLS_RJT to an ABTS (bsc#1220021).\n- scsi: lpfc: Allow lpfc_plogi_confirm_nport() logic to execute for Fabric nodes (bsc#1220021).\n- scsi: lpfc: Change lpfc_vport fc_flag member into a bitmask (bsc#1220021).\n- scsi: lpfc: Change lpfc_vport load_flag member into a bitmask (bsc#1220021).\n- scsi: lpfc: Change nlp state statistic counters into atomic_t (bsc#1220021).\n- scsi: lpfc: Copyright updates for 14.4.0.0 patches (bsc#1220021).\n- scsi: lpfc: Fix failure to delete vports when discovery is in progress (bsc#1220021).\n- scsi: lpfc: Fix possible memory leak in lpfc_rcv_padisc() (bsc#1220021).\n- scsi: lpfc: Initialize status local variable in lpfc_sli4_repost_sgl_list() (bsc#1220021).\n- scsi: lpfc: Move handling of reset congestion statistics events (bsc#1220021).\n- scsi: lpfc: Protect vport fc_nodes list with an explicit spin lock (bsc#1220021).\n- scsi: lpfc: Remove D_ID swap log message from trace event logger (bsc#1220021).\n- scsi: lpfc: Remove NLP_RCV_PLOGI early return during RSCN processing for ndlps (bsc#1220021).\n- scsi: lpfc: Remove shost_lock protection for fc_host_port shost APIs (bsc#1220021).\n- scsi: lpfc: Replace deprecated strncpy() with strscpy() (bsc#1220021).\n- scsi: lpfc: Save FPIN frequency statistics upon receipt of peer cgn notifications (bsc#1220021).\n- scsi: lpfc: Update lpfc version to 14.4.0.0 (bsc#1220021).\n- scsi: lpfc: Use PCI_HEADER_TYPE_MFD instead of literal (bsc#1220021).\n- scsi: lpfc: Use sg_dma_len() API to get struct scatterlist\u0027s length (bsc#1220021).\n- scsi: mpi3mr: Refresh sdev queue depth after controller reset (git-fixes).\n- scsi: Revert \u0027scsi: fcoe: Fix potential deadlock on \u0026fip-\u003ectlr_lock\u0027 (git-fixes bsc#1219141).\n- serial: 8250: Remove serial_rs485 sanitization from em485 (git-fixes).\n- spi-mxs: Fix chipselect glitch (git-fixes).\n- spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected (git-fixes).\n- spi: ppc4xx: Drop write-only variable (git-fixes).\n- spi: sh-msiof: avoid integer overflow in constants (git-fixes).\n- staging: iio: ad5933: fix type mismatch regression (git-fixes).\n- tcp: fix tcp_mtup_probe_success vs wrong snd_cwnd (bsc#1218450).\n- tomoyo: fix UAF write bug in tomoyo_write_control() (git-fixes).\n- topology: Fix up build warning in topology_is_visible() (jsc#PED-7618).\n- topology/sysfs: Add format parameter to macro defining \u0027show\u0027 functions for proc (jsc#PED-7618).\n- topology/sysfs: Add PPIN in sysfs under cpu topology (jsc#PED-7618).\n- topology/sysfs: Hide PPIN on systems that do not support it (jsc#PED-7618).\n- tracing: Fix wasted memory in saved_cmdlines logic (git-fixes).\n- tracing: Inform kmemleak of saved_cmdlines allocation (git-fixes).\n- tracing/probes: Fix to show a parse error for bad type for $comm (git-fixes).\n- tty: allow TIOCSLCKTRMIOS with CAP_CHECKPOINT_RESTORE (git-fixes).\n- UBSAN: array-index-out-of-bounds in dtSplitRoot (git-fixes).\n- usb: cdns: readd old API (git-fixes).\n- usb: cdns3: fix memory double free when handle zero packet (git-fixes).\n- usb: cdns3: fixed memory use after free at cdns3_gadget_ep_disable() (git-fixes).\n- usb: cdns3: Modify the return value of cdns_set_active () to void when CONFIG_PM_SLEEP is disabled (git-fixes).\n- usb: cdns3: Put the cdns set active part outside the spin lock (git-fixes).\n- usb: cdnsp: blocked some cdns3 specific code (git-fixes).\n- usb: cdnsp: fixed issue with incorrect detecting CDNSP family controllers (git-fixes).\n- usb: dwc3: gadget: Do not disconnect if not started (git-fixes).\n- usb: dwc3: gadget: Handle EP0 request dequeuing properly (git-fixes).\n- usb: dwc3: gadget: Ignore End Transfer delay on teardown (git-fixes).\n- usb: dwc3: gadget: Queue PM runtime idle on disconnect event (git-fixes).\n- usb: dwc3: gadget: Refactor EP0 forced stall/restart into a separate API (git-fixes).\n- usb: dwc3: gadget: Submit endxfer command if delayed during disconnect (git-fixes).\n- usb: dwc3: host: Set XHCI_SG_TRB_CACHE_SIZE_QUIRK (git-fixes).\n- usb: f_mass_storage: forbid async queue when shutdown happen (git-fixes).\n- usb: f_mass_storage: forbid async queue when shutdown happen (git-fixes).\n- usb: gadget: core: Add missing kerneldoc for vbus_work (git-fixes).\n- usb: gadget: core: adjust uevent timing on gadget unbind (git-fixes).\n- usb: Gadget: core: Help prevent panic during UVC unconfigure (git-fixes).\n- usb: gadget: core: remove unbalanced mutex_unlock in usb_gadget_activate (git-fixes).\n- usb: gadget: f_hid: fix report descriptor allocation (git-fixes).\n- usb: gadget: Fix obscure lockdep violation for udc_mutex (git-fixes).\n- usb: gadget: Fix use-after-free Read in usb_udc_uevent() (git-fixes).\n- usb: gadget: fsl_qe_udc: validate endpoint index for ch9 udc (git-fixes).\n- usb: gadget: ncm: Avoid dropping datagrams of properly parsed NTBs (git-fixes).\n- usb: gadget: udc: core: Offload usb_udc_vbus_handler processing (git-fixes).\n- usb: gadget: udc: core: Prevent soft_connect_store() race (git-fixes).\n- usb: gadget: udc: Handle gadget_connect failure during bind operation (git-fixes).\n- usb: hub: check for alternate port before enabling A_ALT_HNP_SUPPORT (bsc#1218527).\n- usb: hub: Replace hardcoded quirk value with BIT() macro (git-fixes).\n- usb: hub: Replace hardcoded quirk value with BIT() macro (git-fixes).\n- usb: roles: do not get/set_role() when usb_role_switch is unregistered (git-fixes).\n- usb: roles: fix NULL pointer issue when put module\u0027s reference (git-fixes).\n- usb: serial: cp210x: add ID for IMST iM871A-USB (git-fixes).\n- usb: serial: option: add Fibocom FM101-GL variant (git-fixes).\n- usb: serial: qcserial: add new usb-id for Dell Wireless DW5826e (git-fixes).\n- watchdog: it87_wdt: Keep WDTCTRL bit 3 unmodified for IT8784/IT8786 (git-fixes).\n- wifi: ath11k: fix registration of 6Ghz-only phy without the full channel range (git-fixes).\n- wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus() (git-fixes).\n- wifi: cfg80211: fix missing interfaces when dumping (git-fixes).\n- wifi: cfg80211: fix RCU dereference in __cfg80211_bss_update (git-fixes).\n- wifi: cfg80211: free beacon_ies when overridden from hidden BSS (git-fixes).\n- wifi: iwlwifi: Fix some error codes (git-fixes).\n- wifi: iwlwifi: mvm: avoid baid size integer overflow (git-fixes).\n- wifi: iwlwifi: uninitialized variable in iwl_acpi_get_ppag_table() (git-fixes).\n- wifi: mac80211: adding missing drv_mgd_complete_tx() call (git-fixes).\n- wifi: mac80211: fix race condition on enabling fast-xmit (git-fixes).\n- wifi: nl80211: reject iftype change with mesh ID change (git-fixes).\n- wifi: rt2x00: restart beacon queue when hardware reset (git-fixes).\n- wifi: rtl8xxxu: Add additional USB IDs for RTL8192EU devices (git-fixes).\n- wifi: rtlwifi: rtl8723{be,ae}: using calculate_bit_shift() (git-fixes).\n- wifi: wext-core: Fix -Wstringop-overflow warning in ioctl_standard_iw_point() (git-fixes).\n- x86/asm: Add _ASM_RIP() macro for x86-64 (%rip) suffix (git-fixes).\n- x86/bugs: Add asm helpers for executing VERW (git-fixes).\n- x86/bugs: Use ALTERNATIVE() instead of mds_user_clear static key (git-fixes). Also add mds_user_clear to kABI severities since it\u0027s strictly mitigation related so should be low risk.\n- x86/cpu: X86_FEATURE_INTEL_PPIN finally had a CPUID bit (jsc#PED-7618).\n- x86/entry_32: Add VERW just before userspace transition (git-fixes).\n- x86/entry_64: Add VERW just before userspace transition (git-fixes).\n- x86/mm: Fix memory encryption features advertisement (bsc#1206453).\n- xfs: remove unused fields from struct xbtree_ifakeroot (git-fixes).\n- xfs: short circuit xfs_growfs_data_private() if delta is zero (git-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2024-855,SUSE-SLE-Module-Public-Cloud-15-SP5-2024-855,openSUSE-SLE-15.5-2024-855",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_0855-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2024:0855-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20240855-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2024:0855-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html"
},
{
"category": "self",
"summary": "SUSE Bug 1194869",
"url": "https://bugzilla.suse.com/1194869"
},
{
"category": "self",
"summary": "SUSE Bug 1206453",
"url": "https://bugzilla.suse.com/1206453"
},
{
"category": "self",
"summary": "SUSE Bug 1209412",
"url": "https://bugzilla.suse.com/1209412"
},
{
"category": "self",
"summary": "SUSE Bug 1216776",
"url": "https://bugzilla.suse.com/1216776"
},
{
"category": "self",
"summary": "SUSE Bug 1217927",
"url": "https://bugzilla.suse.com/1217927"
},
{
"category": "self",
"summary": "SUSE Bug 1218195",
"url": "https://bugzilla.suse.com/1218195"
},
{
"category": "self",
"summary": "SUSE Bug 1218216",
"url": "https://bugzilla.suse.com/1218216"
},
{
"category": "self",
"summary": "SUSE Bug 1218450",
"url": "https://bugzilla.suse.com/1218450"
},
{
"category": "self",
"summary": "SUSE Bug 1218527",
"url": "https://bugzilla.suse.com/1218527"
},
{
"category": "self",
"summary": "SUSE Bug 1218562",
"url": "https://bugzilla.suse.com/1218562"
},
{
"category": "self",
"summary": "SUSE Bug 1218663",
"url": "https://bugzilla.suse.com/1218663"
},
{
"category": "self",
"summary": "SUSE Bug 1218915",
"url": "https://bugzilla.suse.com/1218915"
},
{
"category": "self",
"summary": "SUSE Bug 1219126",
"url": "https://bugzilla.suse.com/1219126"
},
{
"category": "self",
"summary": "SUSE Bug 1219127",
"url": "https://bugzilla.suse.com/1219127"
},
{
"category": "self",
"summary": "SUSE Bug 1219141",
"url": "https://bugzilla.suse.com/1219141"
},
{
"category": "self",
"summary": "SUSE Bug 1219146",
"url": "https://bugzilla.suse.com/1219146"
},
{
"category": "self",
"summary": "SUSE Bug 1219295",
"url": "https://bugzilla.suse.com/1219295"
},
{
"category": "self",
"summary": "SUSE Bug 1219443",
"url": "https://bugzilla.suse.com/1219443"
},
{
"category": "self",
"summary": "SUSE Bug 1219653",
"url": "https://bugzilla.suse.com/1219653"
},
{
"category": "self",
"summary": "SUSE Bug 1219827",
"url": "https://bugzilla.suse.com/1219827"
},
{
"category": "self",
"summary": "SUSE Bug 1219835",
"url": "https://bugzilla.suse.com/1219835"
},
{
"category": "self",
"summary": "SUSE Bug 1219839",
"url": "https://bugzilla.suse.com/1219839"
},
{
"category": "self",
"summary": "SUSE Bug 1219840",
"url": "https://bugzilla.suse.com/1219840"
},
{
"category": "self",
"summary": "SUSE Bug 1219934",
"url": "https://bugzilla.suse.com/1219934"
},
{
"category": "self",
"summary": "SUSE Bug 1220003",
"url": "https://bugzilla.suse.com/1220003"
},
{
"category": "self",
"summary": "SUSE Bug 1220009",
"url": "https://bugzilla.suse.com/1220009"
},
{
"category": "self",
"summary": "SUSE Bug 1220021",
"url": "https://bugzilla.suse.com/1220021"
},
{
"category": "self",
"summary": "SUSE Bug 1220030",
"url": "https://bugzilla.suse.com/1220030"
},
{
"category": "self",
"summary": "SUSE Bug 1220106",
"url": "https://bugzilla.suse.com/1220106"
},
{
"category": "self",
"summary": "SUSE Bug 1220140",
"url": "https://bugzilla.suse.com/1220140"
},
{
"category": "self",
"summary": "SUSE Bug 1220187",
"url": "https://bugzilla.suse.com/1220187"
},
{
"category": "self",
"summary": "SUSE Bug 1220238",
"url": "https://bugzilla.suse.com/1220238"
},
{
"category": "self",
"summary": "SUSE Bug 1220240",
"url": "https://bugzilla.suse.com/1220240"
},
{
"category": "self",
"summary": "SUSE Bug 1220241",
"url": "https://bugzilla.suse.com/1220241"
},
{
"category": "self",
"summary": "SUSE Bug 1220243",
"url": "https://bugzilla.suse.com/1220243"
},
{
"category": "self",
"summary": "SUSE Bug 1220250",
"url": "https://bugzilla.suse.com/1220250"
},
{
"category": "self",
"summary": "SUSE Bug 1220251",
"url": "https://bugzilla.suse.com/1220251"
},
{
"category": "self",
"summary": "SUSE Bug 1220253",
"url": "https://bugzilla.suse.com/1220253"
},
{
"category": "self",
"summary": "SUSE Bug 1220254",
"url": "https://bugzilla.suse.com/1220254"
},
{
"category": "self",
"summary": "SUSE Bug 1220255",
"url": "https://bugzilla.suse.com/1220255"
},
{
"category": "self",
"summary": "SUSE Bug 1220257",
"url": "https://bugzilla.suse.com/1220257"
},
{
"category": "self",
"summary": "SUSE Bug 1220267",
"url": "https://bugzilla.suse.com/1220267"
},
{
"category": "self",
"summary": "SUSE Bug 1220277",
"url": "https://bugzilla.suse.com/1220277"
},
{
"category": "self",
"summary": "SUSE Bug 1220317",
"url": "https://bugzilla.suse.com/1220317"
},
{
"category": "self",
"summary": "SUSE Bug 1220325",
"url": "https://bugzilla.suse.com/1220325"
},
{
"category": "self",
"summary": "SUSE Bug 1220326",
"url": "https://bugzilla.suse.com/1220326"
},
{
"category": "self",
"summary": "SUSE Bug 1220328",
"url": "https://bugzilla.suse.com/1220328"
},
{
"category": "self",
"summary": "SUSE Bug 1220330",
"url": "https://bugzilla.suse.com/1220330"
},
{
"category": "self",
"summary": "SUSE Bug 1220335",
"url": "https://bugzilla.suse.com/1220335"
},
{
"category": "self",
"summary": "SUSE Bug 1220344",
"url": "https://bugzilla.suse.com/1220344"
},
{
"category": "self",
"summary": "SUSE Bug 1220348",
"url": "https://bugzilla.suse.com/1220348"
},
{
"category": "self",
"summary": "SUSE Bug 1220350",
"url": "https://bugzilla.suse.com/1220350"
},
{
"category": "self",
"summary": "SUSE Bug 1220364",
"url": "https://bugzilla.suse.com/1220364"
},
{
"category": "self",
"summary": "SUSE Bug 1220392",
"url": "https://bugzilla.suse.com/1220392"
},
{
"category": "self",
"summary": "SUSE Bug 1220393",
"url": "https://bugzilla.suse.com/1220393"
},
{
"category": "self",
"summary": "SUSE Bug 1220398",
"url": "https://bugzilla.suse.com/1220398"
},
{
"category": "self",
"summary": "SUSE Bug 1220409",
"url": "https://bugzilla.suse.com/1220409"
},
{
"category": "self",
"summary": "SUSE Bug 1220433",
"url": "https://bugzilla.suse.com/1220433"
},
{
"category": "self",
"summary": "SUSE Bug 1220444",
"url": "https://bugzilla.suse.com/1220444"
},
{
"category": "self",
"summary": "SUSE Bug 1220457",
"url": "https://bugzilla.suse.com/1220457"
},
{
"category": "self",
"summary": "SUSE Bug 1220459",
"url": "https://bugzilla.suse.com/1220459"
},
{
"category": "self",
"summary": "SUSE Bug 1220469",
"url": "https://bugzilla.suse.com/1220469"
},
{
"category": "self",
"summary": "SUSE Bug 1220649",
"url": "https://bugzilla.suse.com/1220649"
},
{
"category": "self",
"summary": "SUSE Bug 1220735",
"url": "https://bugzilla.suse.com/1220735"
},
{
"category": "self",
"summary": "SUSE Bug 1220736",
"url": "https://bugzilla.suse.com/1220736"
},
{
"category": "self",
"summary": "SUSE Bug 1220796",
"url": "https://bugzilla.suse.com/1220796"
},
{
"category": "self",
"summary": "SUSE Bug 1220825",
"url": "https://bugzilla.suse.com/1220825"
},
{
"category": "self",
"summary": "SUSE Bug 1220845",
"url": "https://bugzilla.suse.com/1220845"
},
{
"category": "self",
"summary": "SUSE Bug 1220848",
"url": "https://bugzilla.suse.com/1220848"
},
{
"category": "self",
"summary": "SUSE Bug 1220917",
"url": "https://bugzilla.suse.com/1220917"
},
{
"category": "self",
"summary": "SUSE Bug 1220930",
"url": "https://bugzilla.suse.com/1220930"
},
{
"category": "self",
"summary": "SUSE Bug 1220931",
"url": "https://bugzilla.suse.com/1220931"
},
{
"category": "self",
"summary": "SUSE Bug 1220933",
"url": "https://bugzilla.suse.com/1220933"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-25162 page",
"url": "https://www.suse.com/security/cve/CVE-2019-25162/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-46923 page",
"url": "https://www.suse.com/security/cve/CVE-2021-46923/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-46924 page",
"url": "https://www.suse.com/security/cve/CVE-2021-46924/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-46932 page",
"url": "https://www.suse.com/security/cve/CVE-2021-46932/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-46934 page",
"url": "https://www.suse.com/security/cve/CVE-2021-46934/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47083 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47083/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48627 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48627/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48628 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48628/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-5197 page",
"url": "https://www.suse.com/security/cve/CVE-2023-5197/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52340 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52340/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52429 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52429/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52439 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52439/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52443 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52443/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52445 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52445/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52447 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52447/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52448 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52448/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52449 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52449/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52451 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52451/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52452 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52452/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52456 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52456/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52457 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52457/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52462 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52462/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52463 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52463/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52464 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52464/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52467 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52467/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52475 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52475/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52478 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52478/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52482 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52482/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52530 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52530/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52531 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52531/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52559 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52559/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-6270 page",
"url": "https://www.suse.com/security/cve/CVE-2023-6270/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-6817 page",
"url": "https://www.suse.com/security/cve/CVE-2023-6817/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-0607 page",
"url": "https://www.suse.com/security/cve/CVE-2024-0607/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-1151 page",
"url": "https://www.suse.com/security/cve/CVE-2024-1151/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-23849 page",
"url": "https://www.suse.com/security/cve/CVE-2024-23849/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-23850 page",
"url": "https://www.suse.com/security/cve/CVE-2024-23850/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-23851 page",
"url": "https://www.suse.com/security/cve/CVE-2024-23851/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-25744 page",
"url": "https://www.suse.com/security/cve/CVE-2024-25744/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26585 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26585/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26586 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26589 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26589/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26591 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26591/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26593 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26593/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26595 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26595/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26598 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26598/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26602 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26602/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26603 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26603/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26607 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26607/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26622 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26622/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2024-03-12T19:46:41Z",
"generator": {
"date": "2024-03-12T19:46:41Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2024:0855-1",
"initial_release_date": "2024-03-12T19:46:41Z",
"revision_history": [
{
"date": "2024-03-12T19:46:41Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"product": {
"name": "cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"product_id": "cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"product": {
"name": "dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"product_id": "dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"product": {
"name": "gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"product_id": "gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-azure-5.14.21-150500.33.37.1.aarch64",
"product": {
"name": "kernel-azure-5.14.21-150500.33.37.1.aarch64",
"product_id": "kernel-azure-5.14.21-150500.33.37.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"product": {
"name": "kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"product_id": "kernel-azure-devel-5.14.21-150500.33.37.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"product": {
"name": "kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"product_id": "kernel-azure-extra-5.14.21-150500.33.37.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"product": {
"name": "kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"product_id": "kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"product": {
"name": "kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"product_id": "kernel-azure-optional-5.14.21-150500.33.37.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"product": {
"name": "kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"product_id": "kernel-syms-azure-5.14.21-150500.33.37.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"product": {
"name": "kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"product_id": "kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"product": {
"name": "ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"product_id": "ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"product": {
"name": "reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"product_id": "reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"product": {
"name": "kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"product_id": "kernel-devel-azure-5.14.21-150500.33.37.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"product": {
"name": "kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"product_id": "kernel-source-azure-5.14.21-150500.33.37.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"product": {
"name": "cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"product_id": "cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"product": {
"name": "dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"product_id": "dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"product": {
"name": "gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"product_id": "gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-5.14.21-150500.33.37.1.x86_64",
"product": {
"name": "kernel-azure-5.14.21-150500.33.37.1.x86_64",
"product_id": "kernel-azure-5.14.21-150500.33.37.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"product": {
"name": "kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"product_id": "kernel-azure-devel-5.14.21-150500.33.37.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"product": {
"name": "kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"product_id": "kernel-azure-extra-5.14.21-150500.33.37.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"product": {
"name": "kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"product_id": "kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"product": {
"name": "kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"product_id": "kernel-azure-optional-5.14.21-150500.33.37.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"product": {
"name": "kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"product_id": "kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"product": {
"name": "kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"product_id": "kernel-syms-azure-5.14.21-150500.33.37.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"product": {
"name": "kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"product_id": "kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"product": {
"name": "ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"product_id": "ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"product": {
"name": "reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"product_id": "reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Public Cloud 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Module for Public Cloud 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-public-cloud:15:sp5"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.5",
"product": {
"name": "openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-5.14.21-150500.33.37.1.aarch64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64"
},
"product_reference": "kernel-azure-5.14.21-150500.33.37.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-5.14.21-150500.33.37.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64"
},
"product_reference": "kernel-azure-5.14.21-150500.33.37.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-devel-5.14.21-150500.33.37.1.aarch64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64"
},
"product_reference": "kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-devel-5.14.21-150500.33.37.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64"
},
"product_reference": "kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-azure-5.14.21-150500.33.37.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch"
},
"product_reference": "kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-azure-5.14.21-150500.33.37.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch"
},
"product_reference": "kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-azure-5.14.21-150500.33.37.1.aarch64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64"
},
"product_reference": "kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-azure-5.14.21-150500.33.37.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64"
},
"product_reference": "kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64"
},
"product_reference": "cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64"
},
"product_reference": "cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64"
},
"product_reference": "dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64"
},
"product_reference": "dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64"
},
"product_reference": "gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64"
},
"product_reference": "gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-5.14.21-150500.33.37.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64"
},
"product_reference": "kernel-azure-5.14.21-150500.33.37.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-5.14.21-150500.33.37.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64"
},
"product_reference": "kernel-azure-5.14.21-150500.33.37.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-devel-5.14.21-150500.33.37.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64"
},
"product_reference": "kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-devel-5.14.21-150500.33.37.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64"
},
"product_reference": "kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-extra-5.14.21-150500.33.37.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64"
},
"product_reference": "kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-extra-5.14.21-150500.33.37.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64"
},
"product_reference": "kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64"
},
"product_reference": "kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64"
},
"product_reference": "kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-optional-5.14.21-150500.33.37.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64"
},
"product_reference": "kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-optional-5.14.21-150500.33.37.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64"
},
"product_reference": "kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64"
},
"product_reference": "kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-azure-5.14.21-150500.33.37.1.noarch as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch"
},
"product_reference": "kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-azure-5.14.21-150500.33.37.1.noarch as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch"
},
"product_reference": "kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-azure-5.14.21-150500.33.37.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64"
},
"product_reference": "kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-azure-5.14.21-150500.33.37.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64"
},
"product_reference": "kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64"
},
"product_reference": "kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64"
},
"product_reference": "kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64"
},
"product_reference": "ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64"
},
"product_reference": "ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64"
},
"product_reference": "reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
},
"product_reference": "reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-25162",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-25162"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ni2c: Fix a potential use after free\n\nFree the adap structure only after we are done using it.\nThis patch just moves the put_device() down a bit to avoid the\nuse after free.\n\n[wsa: added comment to the code, added Fixes tag]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-25162",
"url": "https://www.suse.com/security/cve/CVE-2019-25162"
},
{
"category": "external",
"summary": "SUSE Bug 1220409 for CVE-2019-25162",
"url": "https://bugzilla.suse.com/1220409"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-12T19:46:41Z",
"details": "moderate"
}
],
"title": "CVE-2019-25162"
},
{
"cve": "CVE-2021-46923",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-46923"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs/mount_setattr: always cleanup mount_kattr\n\nMake sure that finish_mount_kattr() is called after mount_kattr was\nsuccesfully built in both the success and failure case to prevent\nleaking any references we took when we built it. We returned early if\npath lookup failed thereby risking to leak an additional reference we\ntook when building mount_kattr when an idmapped mount was requested.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-46923",
"url": "https://www.suse.com/security/cve/CVE-2021-46923"
},
{
"category": "external",
"summary": "SUSE Bug 1220457 for CVE-2021-46923",
"url": "https://bugzilla.suse.com/1220457"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-12T19:46:41Z",
"details": "low"
}
],
"title": "CVE-2021-46923"
},
{
"cve": "CVE-2021-46924",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-46924"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFC: st21nfca: Fix memory leak in device probe and remove\n\n\u0027phy-\u003epending_skb\u0027 is alloced when device probe, but forgot to free\nin the error handling path and remove path, this cause memory leak\nas follows:\n\nunreferenced object 0xffff88800bc06800 (size 512):\n comm \"8\", pid 11775, jiffies 4295159829 (age 9.032s)\n hex dump (first 32 bytes):\n 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\n 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\n backtrace:\n [\u003c00000000d66c09ce\u003e] __kmalloc_node_track_caller+0x1ed/0x450\n [\u003c00000000c93382b3\u003e] kmalloc_reserve+0x37/0xd0\n [\u003c000000005fea522c\u003e] __alloc_skb+0x124/0x380\n [\u003c0000000019f29f9a\u003e] st21nfca_hci_i2c_probe+0x170/0x8f2\n\nFix it by freeing \u0027pending_skb\u0027 in error and remove.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-46924",
"url": "https://www.suse.com/security/cve/CVE-2021-46924"
},
{
"category": "external",
"summary": "SUSE Bug 1220459 for CVE-2021-46924",
"url": "https://bugzilla.suse.com/1220459"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-12T19:46:41Z",
"details": "moderate"
}
],
"title": "CVE-2021-46924"
},
{
"cve": "CVE-2021-46932",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-46932"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nInput: appletouch - initialize work before device registration\n\nSyzbot has reported warning in __flush_work(). This warning is caused by\nwork-\u003efunc == NULL, which means missing work initialization.\n\nThis may happen, since input_dev-\u003eclose() calls\ncancel_work_sync(\u0026dev-\u003ework), but dev-\u003ework initalization happens _after_\ninput_register_device() call.\n\nSo this patch moves dev-\u003ework initialization before registering input\ndevice",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-46932",
"url": "https://www.suse.com/security/cve/CVE-2021-46932"
},
{
"category": "external",
"summary": "SUSE Bug 1220444 for CVE-2021-46932",
"url": "https://bugzilla.suse.com/1220444"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-12T19:46:41Z",
"details": "moderate"
}
],
"title": "CVE-2021-46932"
},
{
"cve": "CVE-2021-46934",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-46934"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ni2c: validate user data in compat ioctl\n\nWrong user data may cause warning in i2c_transfer(), ex: zero msgs.\nUserspace should not be able to trigger warnings, so this patch adds\nvalidation checks for user data in compact ioctl to prevent reported\nwarnings",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-46934",
"url": "https://www.suse.com/security/cve/CVE-2021-46934"
},
{
"category": "external",
"summary": "SUSE Bug 1220469 for CVE-2021-46934",
"url": "https://bugzilla.suse.com/1220469"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-12T19:46:41Z",
"details": "low"
}
],
"title": "CVE-2021-46934"
},
{
"cve": "CVE-2021-47083",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47083"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npinctrl: mediatek: fix global-out-of-bounds issue\n\nWhen eint virtual eint number is greater than gpio number,\nit maybe produce \u0027desc[eint_n]\u0027 size globle-out-of-bounds issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47083",
"url": "https://www.suse.com/security/cve/CVE-2021-47083"
},
{
"category": "external",
"summary": "SUSE Bug 1220917 for CVE-2021-47083",
"url": "https://bugzilla.suse.com/1220917"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-12T19:46:41Z",
"details": "moderate"
}
],
"title": "CVE-2021-47083"
},
{
"cve": "CVE-2022-48627",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48627"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvt: fix memory overlapping when deleting chars in the buffer\n\nA memory overlapping copy occurs when deleting a long line. This memory\noverlapping copy can cause data corruption when scr_memcpyw is optimized\nto memcpy because memcpy does not ensure its behavior if the destination\nbuffer overlaps with the source buffer. The line buffer is not always\nbroken, because the memcpy utilizes the hardware acceleration, whose\nresult is not deterministic.\n\nFix this problem by using replacing the scr_memcpyw with scr_memmovew.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48627",
"url": "https://www.suse.com/security/cve/CVE-2022-48627"
},
{
"category": "external",
"summary": "SUSE Bug 1220845 for CVE-2022-48627",
"url": "https://bugzilla.suse.com/1220845"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-12T19:46:41Z",
"details": "moderate"
}
],
"title": "CVE-2022-48627"
},
{
"cve": "CVE-2022-48628",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48628"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nceph: drop messages from MDS when unmounting\n\nWhen unmounting all the dirty buffers will be flushed and after\nthe last osd request is finished the last reference of the i_count\nwill be released. Then it will flush the dirty cap/snap to MDSs,\nand the unmounting won\u0027t wait the possible acks, which will ihold\nthe inodes when updating the metadata locally but makes no sense\nany more, of this. This will make the evict_inodes() to skip these\ninodes.\n\nIf encrypt is enabled the kernel generate a warning when removing\nthe encrypt keys when the skipped inodes still hold the keyring:\n\nWARNING: CPU: 4 PID: 168846 at fs/crypto/keyring.c:242 fscrypt_destroy_keyring+0x7e/0xd0\nCPU: 4 PID: 168846 Comm: umount Tainted: G S 6.1.0-rc5-ceph-g72ead199864c #1\nHardware name: Supermicro SYS-5018R-WR/X10SRW-F, BIOS 2.0 12/17/2015\nRIP: 0010:fscrypt_destroy_keyring+0x7e/0xd0\nRSP: 0018:ffffc9000b277e28 EFLAGS: 00010202\nRAX: 0000000000000002 RBX: ffff88810d52ac00 RCX: ffff88810b56aa00\nRDX: 0000000080000000 RSI: ffffffff822f3a09 RDI: ffff888108f59000\nRBP: ffff8881d394fb88 R08: 0000000000000028 R09: 0000000000000000\nR10: 0000000000000001 R11: 11ff4fe6834fcd91 R12: ffff8881d394fc40\nR13: ffff888108f59000 R14: ffff8881d394f800 R15: 0000000000000000\nFS: 00007fd83f6f1080(0000) GS:ffff88885fd00000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007f918d417000 CR3: 000000017f89a005 CR4: 00000000003706e0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n\u003cTASK\u003e\ngeneric_shutdown_super+0x47/0x120\nkill_anon_super+0x14/0x30\nceph_kill_sb+0x36/0x90 [ceph]\ndeactivate_locked_super+0x29/0x60\ncleanup_mnt+0xb8/0x140\ntask_work_run+0x67/0xb0\nexit_to_user_mode_prepare+0x23d/0x240\nsyscall_exit_to_user_mode+0x25/0x60\ndo_syscall_64+0x40/0x80\nentry_SYSCALL_64_after_hwframe+0x63/0xcd\nRIP: 0033:0x7fd83dc39e9b\n\nLater the kernel will crash when iput() the inodes and dereferencing\nthe \"sb-\u003es_master_keys\", which has been released by the\ngeneric_shutdown_super().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48628",
"url": "https://www.suse.com/security/cve/CVE-2022-48628"
},
{
"category": "external",
"summary": "SUSE Bug 1220848 for CVE-2022-48628",
"url": "https://bugzilla.suse.com/1220848"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-12T19:46:41Z",
"details": "moderate"
}
],
"title": "CVE-2022-48628"
},
{
"cve": "CVE-2023-5197",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-5197"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free vulnerability in the Linux kernel\u0027s netfilter: nf_tables component can be exploited to achieve local privilege escalation.\n\nAddition and removal of rules from chain bindings within the same transaction causes leads to use-after-free.\n\nWe recommend upgrading past commit f15f29fd4779be8a418b66e9d52979bb6d6c2325.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-5197",
"url": "https://www.suse.com/security/cve/CVE-2023-5197"
},
{
"category": "external",
"summary": "SUSE Bug 1218216 for CVE-2023-5197",
"url": "https://bugzilla.suse.com/1218216"
},
{
"category": "external",
"summary": "SUSE Bug 1245974 for CVE-2023-5197",
"url": "https://bugzilla.suse.com/1245974"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-12T19:46:41Z",
"details": "important"
}
],
"title": "CVE-2023-5197"
},
{
"cve": "CVE-2023-52340",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52340"
}
],
"notes": [
{
"category": "general",
"text": "The IPv6 implementation in the Linux kernel before 6.3 has a net/ipv6/route.c max_size threshold that can be consumed easily, e.g., leading to a denial of service (network is unreachable errors) when IPv6 packets are sent in a loop via a raw socket.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52340",
"url": "https://www.suse.com/security/cve/CVE-2023-52340"
},
{
"category": "external",
"summary": "SUSE Bug 1219295 for CVE-2023-52340",
"url": "https://bugzilla.suse.com/1219295"
},
{
"category": "external",
"summary": "SUSE Bug 1219296 for CVE-2023-52340",
"url": "https://bugzilla.suse.com/1219296"
},
{
"category": "external",
"summary": "SUSE Bug 1224298 for CVE-2023-52340",
"url": "https://bugzilla.suse.com/1224298"
},
{
"category": "external",
"summary": "SUSE Bug 1224878 for CVE-2023-52340",
"url": "https://bugzilla.suse.com/1224878"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-12T19:46:41Z",
"details": "important"
}
],
"title": "CVE-2023-52340"
},
{
"cve": "CVE-2023-52429",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52429"
}
],
"notes": [
{
"category": "general",
"text": "dm_table_create in drivers/md/dm-table.c in the Linux kernel through 6.7.4 can attempt to (in alloc_targets) allocate more than INT_MAX bytes, and crash, because of a missing check for struct dm_ioctl.target_count.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52429",
"url": "https://www.suse.com/security/cve/CVE-2023-52429"
},
{
"category": "external",
"summary": "SUSE Bug 1219827 for CVE-2023-52429",
"url": "https://bugzilla.suse.com/1219827"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-12T19:46:41Z",
"details": "moderate"
}
],
"title": "CVE-2023-52429"
},
{
"cve": "CVE-2023-52439",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52439"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nuio: Fix use-after-free in uio_open\n\ncore-1\t\t\t\tcore-2\n-------------------------------------------------------\nuio_unregister_device\t\tuio_open\n\t\t\t\tidev = idr_find()\ndevice_unregister(\u0026idev-\u003edev)\nput_device(\u0026idev-\u003edev)\nuio_device_release\n\t\t\t\tget_device(\u0026idev-\u003edev)\nkfree(idev)\nuio_free_minor(minor)\n\t\t\t\tuio_release\n\t\t\t\tput_device(\u0026idev-\u003edev)\n\t\t\t\tkfree(idev)\n-------------------------------------------------------\n\nIn the core-1 uio_unregister_device(), the device_unregister will kfree\nidev when the idev-\u003edev kobject ref is 1. But after core-1\ndevice_unregister, put_device and before doing kfree, the core-2 may\nget_device. Then:\n1. After core-1 kfree idev, the core-2 will do use-after-free for idev.\n2. When core-2 do uio_release and put_device, the idev will be double\n freed.\n\nTo address this issue, we can get idev atomic \u0026 inc idev reference with\nminor_lock.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52439",
"url": "https://www.suse.com/security/cve/CVE-2023-52439"
},
{
"category": "external",
"summary": "SUSE Bug 1220140 for CVE-2023-52439",
"url": "https://bugzilla.suse.com/1220140"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-12T19:46:41Z",
"details": "moderate"
}
],
"title": "CVE-2023-52439"
},
{
"cve": "CVE-2023-52443",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52443"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\napparmor: avoid crash when parsed profile name is empty\n\nWhen processing a packed profile in unpack_profile() described like\n\n \"profile :ns::samba-dcerpcd /usr/lib*/samba/{,samba/}samba-dcerpcd {...}\"\n\na string \":samba-dcerpcd\" is unpacked as a fully-qualified name and then\npassed to aa_splitn_fqname().\n\naa_splitn_fqname() treats \":samba-dcerpcd\" as only containing a namespace.\nThus it returns NULL for tmpname, meanwhile tmpns is non-NULL. Later\naa_alloc_profile() crashes as the new profile name is NULL now.\n\ngeneral protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN NOPTI\nKASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007]\nCPU: 6 PID: 1657 Comm: apparmor_parser Not tainted 6.7.0-rc2-dirty #16\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.2-3-gd478f380-rebuilt.opensuse.org 04/01/2014\nRIP: 0010:strlen+0x1e/0xa0\nCall Trace:\n \u003cTASK\u003e\n ? strlen+0x1e/0xa0\n aa_policy_init+0x1bb/0x230\n aa_alloc_profile+0xb1/0x480\n unpack_profile+0x3bc/0x4960\n aa_unpack+0x309/0x15e0\n aa_replace_profiles+0x213/0x33c0\n policy_update+0x261/0x370\n profile_replace+0x20e/0x2a0\n vfs_write+0x2af/0xe00\n ksys_write+0x126/0x250\n do_syscall_64+0x46/0xf0\n entry_SYSCALL_64_after_hwframe+0x6e/0x76\n \u003c/TASK\u003e\n---[ end trace 0000000000000000 ]---\nRIP: 0010:strlen+0x1e/0xa0\n\nIt seems such behaviour of aa_splitn_fqname() is expected and checked in\nother places where it is called (e.g. aa_remove_profiles). Well, there\nis an explicit comment \"a ns name without a following profile is allowed\"\ninside.\n\nAFAICS, nothing can prevent unpacked \"name\" to be in form like\n\":samba-dcerpcd\" - it is passed from userspace.\n\nDeny the whole profile set replacement in such case and inform user with\nEPROTO and an explaining message.\n\nFound by Linux Verification Center (linuxtesting.org).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52443",
"url": "https://www.suse.com/security/cve/CVE-2023-52443"
},
{
"category": "external",
"summary": "SUSE Bug 1220240 for CVE-2023-52443",
"url": "https://bugzilla.suse.com/1220240"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-12T19:46:41Z",
"details": "moderate"
}
],
"title": "CVE-2023-52443"
},
{
"cve": "CVE-2023-52445",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52445"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: pvrusb2: fix use after free on context disconnection\n\nUpon module load, a kthread is created targeting the\npvr2_context_thread_func function, which may call pvr2_context_destroy\nand thus call kfree() on the context object. However, that might happen\nbefore the usb hub_event handler is able to notify the driver. This\npatch adds a sanity check before the invalid read reported by syzbot,\nwithin the context disconnection call stack.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52445",
"url": "https://www.suse.com/security/cve/CVE-2023-52445"
},
{
"category": "external",
"summary": "SUSE Bug 1220241 for CVE-2023-52445",
"url": "https://bugzilla.suse.com/1220241"
},
{
"category": "external",
"summary": "SUSE Bug 1220315 for CVE-2023-52445",
"url": "https://bugzilla.suse.com/1220315"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-12T19:46:41Z",
"details": "moderate"
}
],
"title": "CVE-2023-52445"
},
{
"cve": "CVE-2023-52447",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52447"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Defer the free of inner map when necessary\n\nWhen updating or deleting an inner map in map array or map htab, the map\nmay still be accessed by non-sleepable program or sleepable program.\nHowever bpf_map_fd_put_ptr() decreases the ref-counter of the inner map\ndirectly through bpf_map_put(), if the ref-counter is the last one\n(which is true for most cases), the inner map will be freed by\nops-\u003emap_free() in a kworker. But for now, most .map_free() callbacks\ndon\u0027t use synchronize_rcu() or its variants to wait for the elapse of a\nRCU grace period, so after the invocation of ops-\u003emap_free completes,\nthe bpf program which is accessing the inner map may incur\nuse-after-free problem.\n\nFix the free of inner map by invoking bpf_map_free_deferred() after both\none RCU grace period and one tasks trace RCU grace period if the inner\nmap has been removed from the outer map before. The deferment is\naccomplished by using call_rcu() or call_rcu_tasks_trace() when\nreleasing the last ref-counter of bpf map. The newly-added rcu_head\nfield in bpf_map shares the same storage space with work field to\nreduce the size of bpf_map.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52447",
"url": "https://www.suse.com/security/cve/CVE-2023-52447"
},
{
"category": "external",
"summary": "SUSE Bug 1220251 for CVE-2023-52447",
"url": "https://bugzilla.suse.com/1220251"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-12T19:46:41Z",
"details": "moderate"
}
],
"title": "CVE-2023-52447"
},
{
"cve": "CVE-2023-52448",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52448"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ngfs2: Fix kernel NULL pointer dereference in gfs2_rgrp_dump\n\nSyzkaller has reported a NULL pointer dereference when accessing\nrgd-\u003erd_rgl in gfs2_rgrp_dump(). This can happen when creating\nrgd-\u003erd_gl fails in read_rindex_entry(). Add a NULL pointer check in\ngfs2_rgrp_dump() to prevent that.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52448",
"url": "https://www.suse.com/security/cve/CVE-2023-52448"
},
{
"category": "external",
"summary": "SUSE Bug 1220253 for CVE-2023-52448",
"url": "https://bugzilla.suse.com/1220253"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-12T19:46:41Z",
"details": "moderate"
}
],
"title": "CVE-2023-52448"
},
{
"cve": "CVE-2023-52449",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52449"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmtd: Fix gluebi NULL pointer dereference caused by ftl notifier\n\nIf both ftl.ko and gluebi.ko are loaded, the notifier of ftl\ntriggers NULL pointer dereference when trying to access\n\u0027gluebi-\u003edesc\u0027 in gluebi_read().\n\nubi_gluebi_init\n ubi_register_volume_notifier\n ubi_enumerate_volumes\n ubi_notify_all\n gluebi_notify nb-\u003enotifier_call()\n gluebi_create\n mtd_device_register\n mtd_device_parse_register\n add_mtd_device\n blktrans_notify_add not-\u003eadd()\n ftl_add_mtd tr-\u003eadd_mtd()\n scan_header\n mtd_read\n mtd_read_oob\n mtd_read_oob_std\n gluebi_read mtd-\u003eread()\n gluebi-\u003edesc - NULL\n\nDetailed reproduction information available at the Link [1],\n\nIn the normal case, obtain gluebi-\u003edesc in the gluebi_get_device(),\nand access gluebi-\u003edesc in the gluebi_read(). However,\ngluebi_get_device() is not executed in advance in the\nftl_add_mtd() process, which leads to NULL pointer dereference.\n\nThe solution for the gluebi module is to run jffs2 on the UBI\nvolume without considering working with ftl or mtdblock [2].\nTherefore, this problem can be avoided by preventing gluebi from\ncreating the mtdblock device after creating mtd partition of the\ntype MTD_UBIVOLUME.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52449",
"url": "https://www.suse.com/security/cve/CVE-2023-52449"
},
{
"category": "external",
"summary": "SUSE Bug 1220238 for CVE-2023-52449",
"url": "https://bugzilla.suse.com/1220238"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-12T19:46:41Z",
"details": "moderate"
}
],
"title": "CVE-2023-52449"
},
{
"cve": "CVE-2023-52451",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52451"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/pseries/memhp: Fix access beyond end of drmem array\n\ndlpar_memory_remove_by_index() may access beyond the bounds of the\ndrmem lmb array when the LMB lookup fails to match an entry with the\ngiven DRC index. When the search fails, the cursor is left pointing to\n\u0026drmem_info-\u003elmbs[drmem_info-\u003en_lmbs], which is one element past the\nlast valid entry in the array. The debug message at the end of the\nfunction then dereferences this pointer:\n\n pr_debug(\"Failed to hot-remove memory at %llx\\n\",\n lmb-\u003ebase_addr);\n\nThis was found by inspection and confirmed with KASAN:\n\n pseries-hotplug-mem: Attempting to hot-remove LMB, drc index 1234\n ==================================================================\n BUG: KASAN: slab-out-of-bounds in dlpar_memory+0x298/0x1658\n Read of size 8 at addr c000000364e97fd0 by task bash/949\n\n dump_stack_lvl+0xa4/0xfc (unreliable)\n print_report+0x214/0x63c\n kasan_report+0x140/0x2e0\n __asan_load8+0xa8/0xe0\n dlpar_memory+0x298/0x1658\n handle_dlpar_errorlog+0x130/0x1d0\n dlpar_store+0x18c/0x3e0\n kobj_attr_store+0x68/0xa0\n sysfs_kf_write+0xc4/0x110\n kernfs_fop_write_iter+0x26c/0x390\n vfs_write+0x2d4/0x4e0\n ksys_write+0xac/0x1a0\n system_call_exception+0x268/0x530\n system_call_vectored_common+0x15c/0x2ec\n\n Allocated by task 1:\n kasan_save_stack+0x48/0x80\n kasan_set_track+0x34/0x50\n kasan_save_alloc_info+0x34/0x50\n __kasan_kmalloc+0xd0/0x120\n __kmalloc+0x8c/0x320\n kmalloc_array.constprop.0+0x48/0x5c\n drmem_init+0x2a0/0x41c\n do_one_initcall+0xe0/0x5c0\n kernel_init_freeable+0x4ec/0x5a0\n kernel_init+0x30/0x1e0\n ret_from_kernel_user_thread+0x14/0x1c\n\n The buggy address belongs to the object at c000000364e80000\n which belongs to the cache kmalloc-128k of size 131072\n The buggy address is located 0 bytes to the right of\n allocated 98256-byte region [c000000364e80000, c000000364e97fd0)\n\n ==================================================================\n pseries-hotplug-mem: Failed to hot-remove memory at 0\n\nLog failed lookups with a separate message and dereference the\ncursor only when it points to a valid entry.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52451",
"url": "https://www.suse.com/security/cve/CVE-2023-52451"
},
{
"category": "external",
"summary": "SUSE Bug 1220250 for CVE-2023-52451",
"url": "https://bugzilla.suse.com/1220250"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-12T19:46:41Z",
"details": "moderate"
}
],
"title": "CVE-2023-52451"
},
{
"cve": "CVE-2023-52452",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52452"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Fix accesses to uninit stack slots\n\nPrivileged programs are supposed to be able to read uninitialized stack\nmemory (ever since 6715df8d5) but, before this patch, these accesses\nwere permitted inconsistently. In particular, accesses were permitted\nabove state-\u003eallocated_stack, but not below it. In other words, if the\nstack was already \"large enough\", the access was permitted, but\notherwise the access was rejected instead of being allowed to \"grow the\nstack\". This undesired rejection was happening in two places:\n- in check_stack_slot_within_bounds()\n- in check_stack_range_initialized()\nThis patch arranges for these accesses to be permitted. A bunch of tests\nthat were relying on the old rejection had to change; all of them were\nchanged to add also run unprivileged, in which case the old behavior\npersists. One tests couldn\u0027t be updated - global_func16 - because it\ncan\u0027t run unprivileged for other reasons.\n\nThis patch also fixes the tracking of the stack size for variable-offset\nreads. This second fix is bundled in the same commit as the first one\nbecause they\u0027re inter-related. Before this patch, writes to the stack\nusing registers containing a variable offset (as opposed to registers\nwith fixed, known values) were not properly contributing to the\nfunction\u0027s needed stack size. As a result, it was possible for a program\nto verify, but then to attempt to read out-of-bounds data at runtime\nbecause a too small stack had been allocated for it.\n\nEach function tracks the size of the stack it needs in\nbpf_subprog_info.stack_depth, which is maintained by\nupdate_stack_depth(). For regular memory accesses, check_mem_access()\nwas calling update_state_depth() but it was passing in only the fixed\npart of the offset register, ignoring the variable offset. This was\nincorrect; the minimum possible value of that register should be used\ninstead.\n\nThis tracking is now fixed by centralizing the tracking of stack size in\ngrow_stack_state(), and by lifting the calls to grow_stack_state() to\ncheck_stack_access_within_bounds() as suggested by Andrii. The code is\nnow simpler and more convincingly tracks the correct maximum stack size.\ncheck_stack_range_initialized() can now rely on enough stack having been\nallocated for the access; this helps with the fix for the first issue.\n\nA few tests were changed to also check the stack depth computation. The\none that fails without this patch is verifier_var_off:stack_write_priv_vs_unpriv.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52452",
"url": "https://www.suse.com/security/cve/CVE-2023-52452"
},
{
"category": "external",
"summary": "SUSE Bug 1220257 for CVE-2023-52452",
"url": "https://bugzilla.suse.com/1220257"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-12T19:46:41Z",
"details": "moderate"
}
],
"title": "CVE-2023-52452"
},
{
"cve": "CVE-2023-52456",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52456"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nserial: imx: fix tx statemachine deadlock\n\nWhen using the serial port as RS485 port, the tx statemachine is used to\ncontrol the RTS pin to drive the RS485 transceiver TX_EN pin. When the\nTTY port is closed in the middle of a transmission (for instance during\nuserland application crash), imx_uart_shutdown disables the interface\nand disables the Transmission Complete interrupt. afer that,\nimx_uart_stop_tx bails on an incomplete transmission, to be retriggered\nby the TC interrupt. This interrupt is disabled and therefore the tx\nstatemachine never transitions out of SEND. The statemachine is in\ndeadlock now, and the TX_EN remains low, making the interface useless.\n\nimx_uart_stop_tx now checks for incomplete transmission AND whether TC\ninterrupts are enabled before bailing to be retriggered. This makes sure\nthe state machine handling is reached, and is properly set to\nWAIT_AFTER_SEND.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52456",
"url": "https://www.suse.com/security/cve/CVE-2023-52456"
},
{
"category": "external",
"summary": "SUSE Bug 1220364 for CVE-2023-52456",
"url": "https://bugzilla.suse.com/1220364"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-12T19:46:41Z",
"details": "moderate"
}
],
"title": "CVE-2023-52456"
},
{
"cve": "CVE-2023-52457",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52457"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nserial: 8250: omap: Don\u0027t skip resource freeing if pm_runtime_resume_and_get() failed\n\nReturning an error code from .remove() makes the driver core emit the\nlittle helpful error message:\n\n\tremove callback returned a non-zero value. This will be ignored.\n\nand then remove the device anyhow. So all resources that were not freed\nare leaked in this case. Skipping serial8250_unregister_port() has the\npotential to keep enough of the UART around to trigger a use-after-free.\n\nSo replace the error return (and with it the little helpful error\nmessage) by a more useful error message and continue to cleanup.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52457",
"url": "https://www.suse.com/security/cve/CVE-2023-52457"
},
{
"category": "external",
"summary": "SUSE Bug 1220350 for CVE-2023-52457",
"url": "https://bugzilla.suse.com/1220350"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-12T19:46:41Z",
"details": "moderate"
}
],
"title": "CVE-2023-52457"
},
{
"cve": "CVE-2023-52462",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52462"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: fix check for attempt to corrupt spilled pointer\n\nWhen register is spilled onto a stack as a 1/2/4-byte register, we set\nslot_type[BPF_REG_SIZE - 1] (plus potentially few more below it,\ndepending on actual spill size). So to check if some stack slot has\nspilled register we need to consult slot_type[7], not slot_type[0].\n\nTo avoid the need to remember and double-check this in the future, just\nuse is_spilled_reg() helper.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52462",
"url": "https://www.suse.com/security/cve/CVE-2023-52462"
},
{
"category": "external",
"summary": "SUSE Bug 1220325 for CVE-2023-52462",
"url": "https://bugzilla.suse.com/1220325"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-12T19:46:41Z",
"details": "moderate"
}
],
"title": "CVE-2023-52462"
},
{
"cve": "CVE-2023-52463",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52463"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nefivarfs: force RO when remounting if SetVariable is not supported\n\nIf SetVariable at runtime is not supported by the firmware we never assign\na callback for that function. At the same time mount the efivarfs as\nRO so no one can call that. However, we never check the permission flags\nwhen someone remounts the filesystem as RW. As a result this leads to a\ncrash looking like this:\n\n$ mount -o remount,rw /sys/firmware/efi/efivars\n$ efi-updatevar -f PK.auth PK\n\n[ 303.279166] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000000\n[ 303.280482] Mem abort info:\n[ 303.280854] ESR = 0x0000000086000004\n[ 303.281338] EC = 0x21: IABT (current EL), IL = 32 bits\n[ 303.282016] SET = 0, FnV = 0\n[ 303.282414] EA = 0, S1PTW = 0\n[ 303.282821] FSC = 0x04: level 0 translation fault\n[ 303.283771] user pgtable: 4k pages, 48-bit VAs, pgdp=000000004258c000\n[ 303.284913] [0000000000000000] pgd=0000000000000000, p4d=0000000000000000\n[ 303.286076] Internal error: Oops: 0000000086000004 [#1] PREEMPT SMP\n[ 303.286936] Modules linked in: qrtr tpm_tis tpm_tis_core crct10dif_ce arm_smccc_trng rng_core drm fuse ip_tables x_tables ipv6\n[ 303.288586] CPU: 1 PID: 755 Comm: efi-updatevar Not tainted 6.3.0-rc1-00108-gc7d0c4695c68 #1\n[ 303.289748] Hardware name: Unknown Unknown Product/Unknown Product, BIOS 2023.04-00627-g88336918701d 04/01/2023\n[ 303.291150] pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n[ 303.292123] pc : 0x0\n[ 303.292443] lr : efivar_set_variable_locked+0x74/0xec\n[ 303.293156] sp : ffff800008673c10\n[ 303.293619] x29: ffff800008673c10 x28: ffff0000037e8000 x27: 0000000000000000\n[ 303.294592] x26: 0000000000000800 x25: ffff000002467400 x24: 0000000000000027\n[ 303.295572] x23: ffffd49ea9832000 x22: ffff0000020c9800 x21: ffff000002467000\n[ 303.296566] x20: 0000000000000001 x19: 00000000000007fc x18: 0000000000000000\n[ 303.297531] x17: 0000000000000000 x16: 0000000000000000 x15: 0000aaaac807ab54\n[ 303.298495] x14: ed37489f673633c0 x13: 71c45c606de13f80 x12: 47464259e219acf4\n[ 303.299453] x11: ffff000002af7b01 x10: 0000000000000003 x9 : 0000000000000002\n[ 303.300431] x8 : 0000000000000010 x7 : ffffd49ea8973230 x6 : 0000000000a85201\n[ 303.301412] x5 : 0000000000000000 x4 : ffff0000020c9800 x3 : 00000000000007fc\n[ 303.302370] x2 : 0000000000000027 x1 : ffff000002467400 x0 : ffff000002467000\n[ 303.303341] Call trace:\n[ 303.303679] 0x0\n[ 303.303938] efivar_entry_set_get_size+0x98/0x16c\n[ 303.304585] efivarfs_file_write+0xd0/0x1a4\n[ 303.305148] vfs_write+0xc4/0x2e4\n[ 303.305601] ksys_write+0x70/0x104\n[ 303.306073] __arm64_sys_write+0x1c/0x28\n[ 303.306622] invoke_syscall+0x48/0x114\n[ 303.307156] el0_svc_common.constprop.0+0x44/0xec\n[ 303.307803] do_el0_svc+0x38/0x98\n[ 303.308268] el0_svc+0x2c/0x84\n[ 303.308702] el0t_64_sync_handler+0xf4/0x120\n[ 303.309293] el0t_64_sync+0x190/0x194\n[ 303.309794] Code: ???????? ???????? ???????? ???????? (????????)\n[ 303.310612] ---[ end trace 0000000000000000 ]---\n\nFix this by adding a .reconfigure() function to the fs operations which\nwe can use to check the requested flags and deny anything that\u0027s not RO\nif the firmware doesn\u0027t implement SetVariable at runtime.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52463",
"url": "https://www.suse.com/security/cve/CVE-2023-52463"
},
{
"category": "external",
"summary": "SUSE Bug 1220328 for CVE-2023-52463",
"url": "https://bugzilla.suse.com/1220328"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-12T19:46:41Z",
"details": "moderate"
}
],
"title": "CVE-2023-52463"
},
{
"cve": "CVE-2023-52464",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52464"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nEDAC/thunderx: Fix possible out-of-bounds string access\n\nEnabling -Wstringop-overflow globally exposes a warning for a common bug\nin the usage of strncat():\n\n drivers/edac/thunderx_edac.c: In function \u0027thunderx_ocx_com_threaded_isr\u0027:\n drivers/edac/thunderx_edac.c:1136:17: error: \u0027strncat\u0027 specified bound 1024 equals destination size [-Werror=stringop-overflow=]\n 1136 | strncat(msg, other, OCX_MESSAGE_SIZE);\n | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~\n ...\n 1145 | strncat(msg, other, OCX_MESSAGE_SIZE);\n ...\n 1150 | strncat(msg, other, OCX_MESSAGE_SIZE);\n\n ...\n\nApparently the author of this driver expected strncat() to behave the\nway that strlcat() does, which uses the size of the destination buffer\nas its third argument rather than the length of the source buffer. The\nresult is that there is no check on the size of the allocated buffer.\n\nChange it to strlcat().\n\n [ bp: Trim compiler output, fixup commit message. ]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52464",
"url": "https://www.suse.com/security/cve/CVE-2023-52464"
},
{
"category": "external",
"summary": "SUSE Bug 1220330 for CVE-2023-52464",
"url": "https://bugzilla.suse.com/1220330"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-12T19:46:41Z",
"details": "moderate"
}
],
"title": "CVE-2023-52464"
},
{
"cve": "CVE-2023-52467",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52467"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmfd: syscon: Fix null pointer dereference in of_syscon_register()\n\nkasprintf() returns a pointer to dynamically allocated memory\nwhich can be NULL upon failure.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52467",
"url": "https://www.suse.com/security/cve/CVE-2023-52467"
},
{
"category": "external",
"summary": "SUSE Bug 1220433 for CVE-2023-52467",
"url": "https://bugzilla.suse.com/1220433"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-12T19:46:41Z",
"details": "moderate"
}
],
"title": "CVE-2023-52467"
},
{
"cve": "CVE-2023-52475",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52475"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nInput: powermate - fix use-after-free in powermate_config_complete\n\nsyzbot has found a use-after-free bug [1] in the powermate driver. This\nhappens when the device is disconnected, which leads to a memory free from\nthe powermate_device struct. When an asynchronous control message\ncompletes after the kfree and its callback is invoked, the lock does not\nexist anymore and hence the bug.\n\nUse usb_kill_urb() on pm-\u003econfig to cancel any in-progress requests upon\ndevice disconnection.\n\n[1] https://syzkaller.appspot.com/bug?extid=0434ac83f907a1dbdd1e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52475",
"url": "https://www.suse.com/security/cve/CVE-2023-52475"
},
{
"category": "external",
"summary": "SUSE Bug 1220649 for CVE-2023-52475",
"url": "https://bugzilla.suse.com/1220649"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-12T19:46:41Z",
"details": "moderate"
}
],
"title": "CVE-2023-52475"
},
{
"cve": "CVE-2023-52478",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52478"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: logitech-hidpp: Fix kernel crash on receiver USB disconnect\n\nhidpp_connect_event() has *four* time-of-check vs time-of-use (TOCTOU)\nraces when it races with itself.\n\nhidpp_connect_event() primarily runs from a workqueue but it also runs\non probe() and if a \"device-connected\" packet is received by the hw\nwhen the thread running hidpp_connect_event() from probe() is waiting on\nthe hw, then a second thread running hidpp_connect_event() will be\nstarted from the workqueue.\n\nThis opens the following races (note the below code is simplified):\n\n1. Retrieving + printing the protocol (harmless race):\n\n\tif (!hidpp-\u003eprotocol_major) {\n\t\thidpp_root_get_protocol_version()\n\t\thidpp-\u003eprotocol_major = response.rap.params[0];\n\t}\n\nWe can actually see this race hit in the dmesg in the abrt output\nattached to rhbz#2227968:\n\n[ 3064.624215] logitech-hidpp-device 0003:046D:4071.0049: HID++ 4.5 device connected.\n[ 3064.658184] logitech-hidpp-device 0003:046D:4071.0049: HID++ 4.5 device connected.\n\nTesting with extra logging added has shown that after this the 2 threads\ntake turn grabbing the hw access mutex (send_mutex) so they ping-pong\nthrough all the other TOCTOU cases managing to hit all of them:\n\n2. Updating the name to the HIDPP name (harmless race):\n\n\tif (hidpp-\u003ename == hdev-\u003ename) {\n\t\t...\n\t\thidpp-\u003ename = new_name;\n\t}\n\n3. Initializing the power_supply class for the battery (problematic!):\n\nhidpp_initialize_battery()\n{\n if (hidpp-\u003ebattery.ps)\n return 0;\n\n\tprobe_battery(); /* Blocks, threads take turns executing this */\n\n\thidpp-\u003ebattery.desc.properties =\n\t\tdevm_kmemdup(dev, hidpp_battery_props, cnt, GFP_KERNEL);\n\n\thidpp-\u003ebattery.ps =\n\t\tdevm_power_supply_register(\u0026hidpp-\u003ehid_dev-\u003edev,\n\t\t\t\t\t \u0026hidpp-\u003ebattery.desc, cfg);\n}\n\n4. Creating delayed input_device (potentially problematic):\n\n\tif (hidpp-\u003edelayed_input)\n\t\treturn;\n\n\thidpp-\u003edelayed_input = hidpp_allocate_input(hdev);\n\nThe really big problem here is 3. Hitting the race leads to the following\nsequence:\n\n\thidpp-\u003ebattery.desc.properties =\n\t\tdevm_kmemdup(dev, hidpp_battery_props, cnt, GFP_KERNEL);\n\n\thidpp-\u003ebattery.ps =\n\t\tdevm_power_supply_register(\u0026hidpp-\u003ehid_dev-\u003edev,\n\t\t\t\t\t \u0026hidpp-\u003ebattery.desc, cfg);\n\n\t...\n\n\thidpp-\u003ebattery.desc.properties =\n\t\tdevm_kmemdup(dev, hidpp_battery_props, cnt, GFP_KERNEL);\n\n\thidpp-\u003ebattery.ps =\n\t\tdevm_power_supply_register(\u0026hidpp-\u003ehid_dev-\u003edev,\n\t\t\t\t\t \u0026hidpp-\u003ebattery.desc, cfg);\n\nSo now we have registered 2 power supplies for the same battery,\nwhich looks a bit weird from userspace\u0027s pov but this is not even\nthe really big problem.\n\nNotice how:\n\n1. This is all devm-maganaged\n2. The hidpp-\u003ebattery.desc struct is shared between the 2 power supplies\n3. hidpp-\u003ebattery.desc.properties points to the result from the second\n devm_kmemdup()\n\nThis causes a use after free scenario on USB disconnect of the receiver:\n1. The last registered power supply class device gets unregistered\n2. The memory from the last devm_kmemdup() call gets freed,\n hidpp-\u003ebattery.desc.properties now points to freed memory\n3. The first registered power supply class device gets unregistered,\n this involves sending a remove uevent to userspace which invokes\n power_supply_uevent() to fill the uevent data\n4. power_supply_uevent() uses hidpp-\u003ebattery.desc.properties which\n now points to freed memory leading to backtraces like this one:\n\nSep 22 20:01:35 eric kernel: BUG: unable to handle page fault for address: ffffb2140e017f08\n...\nSep 22 20:01:35 eric kernel: Workqueue: usb_hub_wq hub_event\nSep 22 20:01:35 eric kernel: RIP: 0010:power_supply_uevent+0xee/0x1d0\n...\nSep 22 20:01:35 eric kernel: ? asm_exc_page_fault+0x26/0x30\nSep 22 20:01:35 eric kernel: ? power_supply_uevent+0xee/0x1d0\nSep 22 20:01:35 eric kernel: ? power_supply_uevent+0x10d/0x1d0\nSep 22 20:01:35 eric kernel: dev_uevent+0x10f/0x2d0\nSep 22 20:01:35 eric kernel: kobject_uevent_env+0x291/0x680\nSep 22 20:01:35 eric kernel: \n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52478",
"url": "https://www.suse.com/security/cve/CVE-2023-52478"
},
{
"category": "external",
"summary": "SUSE Bug 1220796 for CVE-2023-52478",
"url": "https://bugzilla.suse.com/1220796"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-12T19:46:41Z",
"details": "moderate"
}
],
"title": "CVE-2023-52478"
},
{
"cve": "CVE-2023-52482",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52482"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86/srso: Add SRSO mitigation for Hygon processors\n\nAdd mitigation for the speculative return stack overflow vulnerability\nwhich exists on Hygon processors too.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52482",
"url": "https://www.suse.com/security/cve/CVE-2023-52482"
},
{
"category": "external",
"summary": "SUSE Bug 1220735 for CVE-2023-52482",
"url": "https://bugzilla.suse.com/1220735"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-12T19:46:41Z",
"details": "moderate"
}
],
"title": "CVE-2023-52482"
},
{
"cve": "CVE-2023-52530",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52530"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mac80211: fix potential key use-after-free\n\nWhen ieee80211_key_link() is called by ieee80211_gtk_rekey_add()\nbut returns 0 due to KRACK protection (identical key reinstall),\nieee80211_gtk_rekey_add() will still return a pointer into the\nkey, in a potential use-after-free. This normally doesn\u0027t happen\nsince it\u0027s only called by iwlwifi in case of WoWLAN rekey offload\nwhich has its own KRACK protection, but still better to fix, do\nthat by returning an error code and converting that to success on\nthe cfg80211 boundary only, leaving the error for bad callers of\nieee80211_gtk_rekey_add().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52530",
"url": "https://www.suse.com/security/cve/CVE-2023-52530"
},
{
"category": "external",
"summary": "SUSE Bug 1220930 for CVE-2023-52530",
"url": "https://bugzilla.suse.com/1220930"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-12T19:46:41Z",
"details": "moderate"
}
],
"title": "CVE-2023-52530"
},
{
"cve": "CVE-2023-52531",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52531"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: iwlwifi: mvm: Fix a memory corruption issue\n\nA few lines above, space is kzalloc()\u0027ed for:\n\tsizeof(struct iwl_nvm_data) +\n\tsizeof(struct ieee80211_channel) +\n\tsizeof(struct ieee80211_rate)\n\n\u0027mvm-\u003envm_data\u0027 is a \u0027struct iwl_nvm_data\u0027, so it is fine.\n\nAt the end of this structure, there is the \u0027channels\u0027 flex array.\nEach element is of type \u0027struct ieee80211_channel\u0027.\nSo only 1 element is allocated in this array.\n\nWhen doing:\n mvm-\u003envm_data-\u003ebands[0].channels = mvm-\u003envm_data-\u003echannels;\nWe point at the first element of the \u0027channels\u0027 flex array.\nSo this is fine.\n\nHowever, when doing:\n mvm-\u003envm_data-\u003ebands[0].bitrates =\n\t\t\t(void *)((u8 *)mvm-\u003envm_data-\u003echannels + 1);\nbecause of the \"(u8 *)\" cast, we add only 1 to the address of the beginning\nof the flex array.\n\nIt is likely that we want point at the \u0027struct ieee80211_rate\u0027 allocated\njust after.\n\nRemove the spurious casting so that the pointer arithmetic works as\nexpected.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52531",
"url": "https://www.suse.com/security/cve/CVE-2023-52531"
},
{
"category": "external",
"summary": "SUSE Bug 1220931 for CVE-2023-52531",
"url": "https://bugzilla.suse.com/1220931"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-12T19:46:41Z",
"details": "moderate"
}
],
"title": "CVE-2023-52531"
},
{
"cve": "CVE-2023-52559",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52559"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\niommu/vt-d: Avoid memory allocation in iommu_suspend()\n\nThe iommu_suspend() syscore suspend callback is invoked with IRQ disabled.\nAllocating memory with the GFP_KERNEL flag may re-enable IRQs during\nthe suspend callback, which can cause intermittent suspend/hibernation\nproblems with the following kernel traces:\n\nCalling iommu_suspend+0x0/0x1d0\n------------[ cut here ]------------\nWARNING: CPU: 0 PID: 15 at kernel/time/timekeeping.c:868 ktime_get+0x9b/0xb0\n...\nCPU: 0 PID: 15 Comm: rcu_preempt Tainted: G U E 6.3-intel #r1\nRIP: 0010:ktime_get+0x9b/0xb0\n...\nCall Trace:\n \u003cIRQ\u003e\n tick_sched_timer+0x22/0x90\n ? __pfx_tick_sched_timer+0x10/0x10\n __hrtimer_run_queues+0x111/0x2b0\n hrtimer_interrupt+0xfa/0x230\n __sysvec_apic_timer_interrupt+0x63/0x140\n sysvec_apic_timer_interrupt+0x7b/0xa0\n \u003c/IRQ\u003e\n \u003cTASK\u003e\n asm_sysvec_apic_timer_interrupt+0x1f/0x30\n...\n------------[ cut here ]------------\nInterrupts enabled after iommu_suspend+0x0/0x1d0\nWARNING: CPU: 0 PID: 27420 at drivers/base/syscore.c:68 syscore_suspend+0x147/0x270\nCPU: 0 PID: 27420 Comm: rtcwake Tainted: G U W E 6.3-intel #r1\nRIP: 0010:syscore_suspend+0x147/0x270\n...\nCall Trace:\n \u003cTASK\u003e\n hibernation_snapshot+0x25b/0x670\n hibernate+0xcd/0x390\n state_store+0xcf/0xe0\n kobj_attr_store+0x13/0x30\n sysfs_kf_write+0x3f/0x50\n kernfs_fop_write_iter+0x128/0x200\n vfs_write+0x1fd/0x3c0\n ksys_write+0x6f/0xf0\n __x64_sys_write+0x1d/0x30\n do_syscall_64+0x3b/0x90\n entry_SYSCALL_64_after_hwframe+0x72/0xdc\n\nGiven that only 4 words memory is needed, avoid the memory allocation in\niommu_suspend().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52559",
"url": "https://www.suse.com/security/cve/CVE-2023-52559"
},
{
"category": "external",
"summary": "SUSE Bug 1220933 for CVE-2023-52559",
"url": "https://bugzilla.suse.com/1220933"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-12T19:46:41Z",
"details": "moderate"
}
],
"title": "CVE-2023-52559"
},
{
"cve": "CVE-2023-6270",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-6270"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the ATA over Ethernet (AoE) driver in the Linux kernel. The aoecmd_cfg_pkts() function improperly updates the refcnt on `struct net_device`, and a use-after-free can be triggered by racing between the free on the struct and the access through the `skbtxq` global queue. This could lead to a denial of service condition or potential code execution.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-6270",
"url": "https://www.suse.com/security/cve/CVE-2023-6270"
},
{
"category": "external",
"summary": "SUSE Bug 1218562 for CVE-2023-6270",
"url": "https://bugzilla.suse.com/1218562"
},
{
"category": "external",
"summary": "SUSE Bug 1218813 for CVE-2023-6270",
"url": "https://bugzilla.suse.com/1218813"
},
{
"category": "external",
"summary": "SUSE Bug 1221578 for CVE-2023-6270",
"url": "https://bugzilla.suse.com/1221578"
},
{
"category": "external",
"summary": "SUSE Bug 1221598 for CVE-2023-6270",
"url": "https://bugzilla.suse.com/1221598"
},
{
"category": "external",
"summary": "SUSE Bug 1223016 for CVE-2023-6270",
"url": "https://bugzilla.suse.com/1223016"
},
{
"category": "external",
"summary": "SUSE Bug 1227675 for CVE-2023-6270",
"url": "https://bugzilla.suse.com/1227675"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-12T19:46:41Z",
"details": "moderate"
}
],
"title": "CVE-2023-6270"
},
{
"cve": "CVE-2023-6817",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-6817"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free vulnerability in the Linux kernel\u0027s netfilter: nf_tables component can be exploited to achieve local privilege escalation.\n\nThe function nft_pipapo_walk did not skip inactive elements during set walk which could lead double deactivations of PIPAPO (Pile Packet Policies) elements, leading to use-after-free.\n\nWe recommend upgrading past commit 317eb9685095678f2c9f5a8189de698c5354316a.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-6817",
"url": "https://www.suse.com/security/cve/CVE-2023-6817"
},
{
"category": "external",
"summary": "SUSE Bug 1218195 for CVE-2023-6817",
"url": "https://bugzilla.suse.com/1218195"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-12T19:46:41Z",
"details": "moderate"
}
],
"title": "CVE-2023-6817"
},
{
"cve": "CVE-2024-0607",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-0607"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Netfilter subsystem in the Linux kernel. The issue is in the nft_byteorder_eval() function, where the code iterates through a loop and writes to the `dst` array. On each iteration, 8 bytes are written, but `dst` is an array of u32, so each element only has space for 4 bytes. That means every iteration overwrites part of the previous element corrupting this array of u32. This flaw allows a local user to cause a denial of service or potentially break NetFilter functionality.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-0607",
"url": "https://www.suse.com/security/cve/CVE-2024-0607"
},
{
"category": "external",
"summary": "SUSE Bug 1218915 for CVE-2024-0607",
"url": "https://bugzilla.suse.com/1218915"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-12T19:46:41Z",
"details": "moderate"
}
],
"title": "CVE-2024-0607"
},
{
"cve": "CVE-2024-1151",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-1151"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was reported in the Open vSwitch sub-component in the Linux Kernel. The flaw occurs when a recursive operation of code push recursively calls into the code block. The OVS module does not validate the stack depth, pushing too many frames and causing a stack overflow. As a result, this can lead to a crash or other related issues.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-1151",
"url": "https://www.suse.com/security/cve/CVE-2024-1151"
},
{
"category": "external",
"summary": "SUSE Bug 1219835 for CVE-2024-1151",
"url": "https://bugzilla.suse.com/1219835"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-12T19:46:41Z",
"details": "moderate"
}
],
"title": "CVE-2024-1151"
},
{
"cve": "CVE-2024-23849",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-23849"
}
],
"notes": [
{
"category": "general",
"text": "In rds_recv_track_latency in net/rds/af_rds.c in the Linux kernel through 6.7.1, there is an off-by-one error for an RDS_MSG_RX_DGRAM_TRACE_MAX comparison, resulting in out-of-bounds access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-23849",
"url": "https://www.suse.com/security/cve/CVE-2024-23849"
},
{
"category": "external",
"summary": "SUSE Bug 1219127 for CVE-2024-23849",
"url": "https://bugzilla.suse.com/1219127"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-12T19:46:41Z",
"details": "moderate"
}
],
"title": "CVE-2024-23849"
},
{
"cve": "CVE-2024-23850",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-23850"
}
],
"notes": [
{
"category": "general",
"text": "In btrfs_get_root_ref in fs/btrfs/disk-io.c in the Linux kernel through 6.7.1, there can be an assertion failure and crash because a subvolume can be read out too soon after its root item is inserted upon subvolume creation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-23850",
"url": "https://www.suse.com/security/cve/CVE-2024-23850"
},
{
"category": "external",
"summary": "SUSE Bug 1219126 for CVE-2024-23850",
"url": "https://bugzilla.suse.com/1219126"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-12T19:46:41Z",
"details": "moderate"
}
],
"title": "CVE-2024-23850"
},
{
"cve": "CVE-2024-23851",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-23851"
}
],
"notes": [
{
"category": "general",
"text": "copy_params in drivers/md/dm-ioctl.c in the Linux kernel through 6.7.1 can attempt to allocate more than INT_MAX bytes, and crash, because of a missing param_kernel-\u003edata_size check. This is related to ctl_ioctl.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-23851",
"url": "https://www.suse.com/security/cve/CVE-2024-23851"
},
{
"category": "external",
"summary": "SUSE Bug 1219146 for CVE-2024-23851",
"url": "https://bugzilla.suse.com/1219146"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-12T19:46:41Z",
"details": "moderate"
}
],
"title": "CVE-2024-23851"
},
{
"cve": "CVE-2024-25744",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-25744"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 6.6.7, an untrusted VMM can trigger int80 syscall handling at any given point. This is related to arch/x86/coco/tdx/tdx.c and arch/x86/mm/mem_encrypt_amd.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-25744",
"url": "https://www.suse.com/security/cve/CVE-2024-25744"
},
{
"category": "external",
"summary": "SUSE Bug 1217927 for CVE-2024-25744",
"url": "https://bugzilla.suse.com/1217927"
},
{
"category": "external",
"summary": "SUSE Bug 1220314 for CVE-2024-25744",
"url": "https://bugzilla.suse.com/1220314"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-12T19:46:41Z",
"details": "important"
}
],
"title": "CVE-2024-25744"
},
{
"cve": "CVE-2024-26585",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26585"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntls: fix race between tx work scheduling and socket close\n\nSimilarly to previous commit, the submitting thread (recvmsg/sendmsg)\nmay exit as soon as the async crypto handler calls complete().\nReorder scheduling the work before calling complete().\nThis seems more logical in the first place, as it\u0027s\nthe inverse order of what the submitting thread will do.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26585",
"url": "https://www.suse.com/security/cve/CVE-2024-26585"
},
{
"category": "external",
"summary": "SUSE Bug 1220187 for CVE-2024-26585",
"url": "https://bugzilla.suse.com/1220187"
},
{
"category": "external",
"summary": "SUSE Bug 1220211 for CVE-2024-26585",
"url": "https://bugzilla.suse.com/1220211"
},
{
"category": "external",
"summary": "SUSE Bug 1224298 for CVE-2024-26585",
"url": "https://bugzilla.suse.com/1224298"
},
{
"category": "external",
"summary": "SUSE Bug 1224878 for CVE-2024-26585",
"url": "https://bugzilla.suse.com/1224878"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-12T19:46:41Z",
"details": "important"
}
],
"title": "CVE-2024-26585"
},
{
"cve": "CVE-2024-26586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26586"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmlxsw: spectrum_acl_tcam: Fix stack corruption\n\nWhen tc filters are first added to a net device, the corresponding local\nport gets bound to an ACL group in the device. The group contains a list\nof ACLs. In turn, each ACL points to a different TCAM region where the\nfilters are stored. During forwarding, the ACLs are sequentially\nevaluated until a match is found.\n\nOne reason to place filters in different regions is when they are added\nwith decreasing priorities and in an alternating order so that two\nconsecutive filters can never fit in the same region because of their\nkey usage.\n\nIn Spectrum-2 and newer ASICs the firmware started to report that the\nmaximum number of ACLs in a group is more than 16, but the layout of the\nregister that configures ACL groups (PAGT) was not updated to account\nfor that. It is therefore possible to hit stack corruption [1] in the\nrare case where more than 16 ACLs in a group are required.\n\nFix by limiting the maximum ACL group size to the minimum between what\nthe firmware reports and the maximum ACLs that fit in the PAGT register.\n\nAdd a test case to make sure the machine does not crash when this\ncondition is hit.\n\n[1]\nKernel panic - not syncing: stack-protector: Kernel stack is corrupted in: mlxsw_sp_acl_tcam_group_update+0x116/0x120\n[...]\n dump_stack_lvl+0x36/0x50\n panic+0x305/0x330\n __stack_chk_fail+0x15/0x20\n mlxsw_sp_acl_tcam_group_update+0x116/0x120\n mlxsw_sp_acl_tcam_group_region_attach+0x69/0x110\n mlxsw_sp_acl_tcam_vchunk_get+0x492/0xa20\n mlxsw_sp_acl_tcam_ventry_add+0x25/0xe0\n mlxsw_sp_acl_rule_add+0x47/0x240\n mlxsw_sp_flower_replace+0x1a9/0x1d0\n tc_setup_cb_add+0xdc/0x1c0\n fl_hw_replace_filter+0x146/0x1f0\n fl_change+0xc17/0x1360\n tc_new_tfilter+0x472/0xb90\n rtnetlink_rcv_msg+0x313/0x3b0\n netlink_rcv_skb+0x58/0x100\n netlink_unicast+0x244/0x390\n netlink_sendmsg+0x1e4/0x440\n ____sys_sendmsg+0x164/0x260\n ___sys_sendmsg+0x9a/0xe0\n __sys_sendmsg+0x7a/0xc0\n do_syscall_64+0x40/0xe0\n entry_SYSCALL_64_after_hwframe+0x63/0x6b",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26586",
"url": "https://www.suse.com/security/cve/CVE-2024-26586"
},
{
"category": "external",
"summary": "SUSE Bug 1220243 for CVE-2024-26586",
"url": "https://bugzilla.suse.com/1220243"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-12T19:46:41Z",
"details": "moderate"
}
],
"title": "CVE-2024-26586"
},
{
"cve": "CVE-2024-26589",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26589"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Reject variable offset alu on PTR_TO_FLOW_KEYS\n\nFor PTR_TO_FLOW_KEYS, check_flow_keys_access() only uses fixed off\nfor validation. However, variable offset ptr alu is not prohibited\nfor this ptr kind. So the variable offset is not checked.\n\nThe following prog is accepted:\n\n func#0 @0\n 0: R1=ctx() R10=fp0\n 0: (bf) r6 = r1 ; R1=ctx() R6_w=ctx()\n 1: (79) r7 = *(u64 *)(r6 +144) ; R6_w=ctx() R7_w=flow_keys()\n 2: (b7) r8 = 1024 ; R8_w=1024\n 3: (37) r8 /= 1 ; R8_w=scalar()\n 4: (57) r8 \u0026= 1024 ; R8_w=scalar(smin=smin32=0,\n smax=umax=smax32=umax32=1024,var_off=(0x0; 0x400))\n 5: (0f) r7 += r8\n mark_precise: frame0: last_idx 5 first_idx 0 subseq_idx -1\n mark_precise: frame0: regs=r8 stack= before 4: (57) r8 \u0026= 1024\n mark_precise: frame0: regs=r8 stack= before 3: (37) r8 /= 1\n mark_precise: frame0: regs=r8 stack= before 2: (b7) r8 = 1024\n 6: R7_w=flow_keys(smin=smin32=0,smax=umax=smax32=umax32=1024,var_off\n =(0x0; 0x400)) R8_w=scalar(smin=smin32=0,smax=umax=smax32=umax32=1024,\n var_off=(0x0; 0x400))\n 6: (79) r0 = *(u64 *)(r7 +0) ; R0_w=scalar()\n 7: (95) exit\n\nThis prog loads flow_keys to r7, and adds the variable offset r8\nto r7, and finally causes out-of-bounds access:\n\n BUG: unable to handle page fault for address: ffffc90014c80038\n [...]\n Call Trace:\n \u003cTASK\u003e\n bpf_dispatcher_nop_func include/linux/bpf.h:1231 [inline]\n __bpf_prog_run include/linux/filter.h:651 [inline]\n bpf_prog_run include/linux/filter.h:658 [inline]\n bpf_prog_run_pin_on_cpu include/linux/filter.h:675 [inline]\n bpf_flow_dissect+0x15f/0x350 net/core/flow_dissector.c:991\n bpf_prog_test_run_flow_dissector+0x39d/0x620 net/bpf/test_run.c:1359\n bpf_prog_test_run kernel/bpf/syscall.c:4107 [inline]\n __sys_bpf+0xf8f/0x4560 kernel/bpf/syscall.c:5475\n __do_sys_bpf kernel/bpf/syscall.c:5561 [inline]\n __se_sys_bpf kernel/bpf/syscall.c:5559 [inline]\n __x64_sys_bpf+0x73/0xb0 kernel/bpf/syscall.c:5559\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0x3f/0x110 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x63/0x6b\n\nFix this by rejecting ptr alu with variable offset on flow_keys.\nApplying the patch rejects the program with \"R7 pointer arithmetic\non flow_keys prohibited\".",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26589",
"url": "https://www.suse.com/security/cve/CVE-2024-26589"
},
{
"category": "external",
"summary": "SUSE Bug 1220255 for CVE-2024-26589",
"url": "https://bugzilla.suse.com/1220255"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-12T19:46:41Z",
"details": "moderate"
}
],
"title": "CVE-2024-26589"
},
{
"cve": "CVE-2024-26591",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26591"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Fix re-attachment branch in bpf_tracing_prog_attach\n\nThe following case can cause a crash due to missing attach_btf:\n\n1) load rawtp program\n2) load fentry program with rawtp as target_fd\n3) create tracing link for fentry program with target_fd = 0\n4) repeat 3\n\nIn the end we have:\n\n- prog-\u003eaux-\u003edst_trampoline == NULL\n- tgt_prog == NULL (because we did not provide target_fd to link_create)\n- prog-\u003eaux-\u003eattach_btf == NULL (the program was loaded with attach_prog_fd=X)\n- the program was loaded for tgt_prog but we have no way to find out which one\n\n BUG: kernel NULL pointer dereference, address: 0000000000000058\n Call Trace:\n \u003cTASK\u003e\n ? __die+0x20/0x70\n ? page_fault_oops+0x15b/0x430\n ? fixup_exception+0x22/0x330\n ? exc_page_fault+0x6f/0x170\n ? asm_exc_page_fault+0x22/0x30\n ? bpf_tracing_prog_attach+0x279/0x560\n ? btf_obj_id+0x5/0x10\n bpf_tracing_prog_attach+0x439/0x560\n __sys_bpf+0x1cf4/0x2de0\n __x64_sys_bpf+0x1c/0x30\n do_syscall_64+0x41/0xf0\n entry_SYSCALL_64_after_hwframe+0x6e/0x76\n\nReturn -EINVAL in this situation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26591",
"url": "https://www.suse.com/security/cve/CVE-2024-26591"
},
{
"category": "external",
"summary": "SUSE Bug 1220254 for CVE-2024-26591",
"url": "https://bugzilla.suse.com/1220254"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-12T19:46:41Z",
"details": "moderate"
}
],
"title": "CVE-2024-26591"
},
{
"cve": "CVE-2024-26593",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26593"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ni2c: i801: Fix block process call transactions\n\nAccording to the Intel datasheets, software must reset the block\nbuffer index twice for block process call transactions: once before\nwriting the outgoing data to the buffer, and once again before\nreading the incoming data from the buffer.\n\nThe driver is currently missing the second reset, causing the wrong\nportion of the block buffer to be read.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26593",
"url": "https://www.suse.com/security/cve/CVE-2024-26593"
},
{
"category": "external",
"summary": "SUSE Bug 1220009 for CVE-2024-26593",
"url": "https://bugzilla.suse.com/1220009"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-12T19:46:41Z",
"details": "moderate"
}
],
"title": "CVE-2024-26593"
},
{
"cve": "CVE-2024-26595",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26595"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmlxsw: spectrum_acl_tcam: Fix NULL pointer dereference in error path\n\nWhen calling mlxsw_sp_acl_tcam_region_destroy() from an error path after\nfailing to attach the region to an ACL group, we hit a NULL pointer\ndereference upon \u0027region-\u003egroup-\u003etcam\u0027 [1].\n\nFix by retrieving the \u0027tcam\u0027 pointer using mlxsw_sp_acl_to_tcam().\n\n[1]\nBUG: kernel NULL pointer dereference, address: 0000000000000000\n[...]\nRIP: 0010:mlxsw_sp_acl_tcam_region_destroy+0xa0/0xd0\n[...]\nCall Trace:\n mlxsw_sp_acl_tcam_vchunk_get+0x88b/0xa20\n mlxsw_sp_acl_tcam_ventry_add+0x25/0xe0\n mlxsw_sp_acl_rule_add+0x47/0x240\n mlxsw_sp_flower_replace+0x1a9/0x1d0\n tc_setup_cb_add+0xdc/0x1c0\n fl_hw_replace_filter+0x146/0x1f0\n fl_change+0xc17/0x1360\n tc_new_tfilter+0x472/0xb90\n rtnetlink_rcv_msg+0x313/0x3b0\n netlink_rcv_skb+0x58/0x100\n netlink_unicast+0x244/0x390\n netlink_sendmsg+0x1e4/0x440\n ____sys_sendmsg+0x164/0x260\n ___sys_sendmsg+0x9a/0xe0\n __sys_sendmsg+0x7a/0xc0\n do_syscall_64+0x40/0xe0\n entry_SYSCALL_64_after_hwframe+0x63/0x6b",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26595",
"url": "https://www.suse.com/security/cve/CVE-2024-26595"
},
{
"category": "external",
"summary": "SUSE Bug 1220344 for CVE-2024-26595",
"url": "https://bugzilla.suse.com/1220344"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-12T19:46:41Z",
"details": "moderate"
}
],
"title": "CVE-2024-26595"
},
{
"cve": "CVE-2024-26598",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26598"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache\n\nThere is a potential UAF scenario in the case of an LPI translation\ncache hit racing with an operation that invalidates the cache, such\nas a DISCARD ITS command. The root of the problem is that\nvgic_its_check_cache() does not elevate the refcount on the vgic_irq\nbefore dropping the lock that serializes refcount changes.\n\nHave vgic_its_check_cache() raise the refcount on the returned vgic_irq\nand add the corresponding decrement after queueing the interrupt.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26598",
"url": "https://www.suse.com/security/cve/CVE-2024-26598"
},
{
"category": "external",
"summary": "SUSE Bug 1220326 for CVE-2024-26598",
"url": "https://bugzilla.suse.com/1220326"
},
{
"category": "external",
"summary": "SUSE Bug 1221129 for CVE-2024-26598",
"url": "https://bugzilla.suse.com/1221129"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-12T19:46:41Z",
"details": "important"
}
],
"title": "CVE-2024-26598"
},
{
"cve": "CVE-2024-26602",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26602"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsched/membarrier: reduce the ability to hammer on sys_membarrier\n\nOn some systems, sys_membarrier can be very expensive, causing overall\nslowdowns for everything. So put a lock on the path in order to\nserialize the accesses to prevent the ability for this to be called at\ntoo high of a frequency and saturate the machine.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26602",
"url": "https://www.suse.com/security/cve/CVE-2024-26602"
},
{
"category": "external",
"summary": "SUSE Bug 1220398 for CVE-2024-26602",
"url": "https://bugzilla.suse.com/1220398"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-12T19:46:41Z",
"details": "moderate"
}
],
"title": "CVE-2024-26602"
},
{
"cve": "CVE-2024-26603",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26603"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86/fpu: Stop relying on userspace for info to fault in xsave buffer\n\nBefore this change, the expected size of the user space buffer was\ntaken from fx_sw-\u003exstate_size. fx_sw-\u003exstate_size can be changed\nfrom user-space, so it is possible construct a sigreturn frame where:\n\n * fx_sw-\u003exstate_size is smaller than the size required by valid bits in\n fx_sw-\u003exfeatures.\n * user-space unmaps parts of the sigrame fpu buffer so that not all of\n the buffer required by xrstor is accessible.\n\nIn this case, xrstor tries to restore and accesses the unmapped area\nwhich results in a fault. But fault_in_readable succeeds because buf +\nfx_sw-\u003exstate_size is within the still mapped area, so it goes back and\ntries xrstor again. It will spin in this loop forever.\n\nInstead, fault in the maximum size which can be touched by XRSTOR (taken\nfrom fpstate-\u003euser_size).\n\n[ dhansen: tweak subject / changelog ]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26603",
"url": "https://www.suse.com/security/cve/CVE-2024-26603"
},
{
"category": "external",
"summary": "SUSE Bug 1220335 for CVE-2024-26603",
"url": "https://bugzilla.suse.com/1220335"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-12T19:46:41Z",
"details": "moderate"
}
],
"title": "CVE-2024-26603"
},
{
"cve": "CVE-2024-26607",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26607"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/bridge: sii902x: Fix probing race issue\n\nA null pointer dereference crash has been observed rarely on TI\nplatforms using sii9022 bridge:\n\n[ 53.271356] sii902x_get_edid+0x34/0x70 [sii902x]\n[ 53.276066] sii902x_bridge_get_edid+0x14/0x20 [sii902x]\n[ 53.281381] drm_bridge_get_edid+0x20/0x34 [drm]\n[ 53.286305] drm_bridge_connector_get_modes+0x8c/0xcc [drm_kms_helper]\n[ 53.292955] drm_helper_probe_single_connector_modes+0x190/0x538 [drm_kms_helper]\n[ 53.300510] drm_client_modeset_probe+0x1f0/0xbd4 [drm]\n[ 53.305958] __drm_fb_helper_initial_config_and_unlock+0x50/0x510 [drm_kms_helper]\n[ 53.313611] drm_fb_helper_initial_config+0x48/0x58 [drm_kms_helper]\n[ 53.320039] drm_fbdev_dma_client_hotplug+0x84/0xd4 [drm_dma_helper]\n[ 53.326401] drm_client_register+0x5c/0xa0 [drm]\n[ 53.331216] drm_fbdev_dma_setup+0xc8/0x13c [drm_dma_helper]\n[ 53.336881] tidss_probe+0x128/0x264 [tidss]\n[ 53.341174] platform_probe+0x68/0xc4\n[ 53.344841] really_probe+0x188/0x3c4\n[ 53.348501] __driver_probe_device+0x7c/0x16c\n[ 53.352854] driver_probe_device+0x3c/0x10c\n[ 53.357033] __device_attach_driver+0xbc/0x158\n[ 53.361472] bus_for_each_drv+0x88/0xe8\n[ 53.365303] __device_attach+0xa0/0x1b4\n[ 53.369135] device_initial_probe+0x14/0x20\n[ 53.373314] bus_probe_device+0xb0/0xb4\n[ 53.377145] deferred_probe_work_func+0xcc/0x124\n[ 53.381757] process_one_work+0x1f0/0x518\n[ 53.385770] worker_thread+0x1e8/0x3dc\n[ 53.389519] kthread+0x11c/0x120\n[ 53.392750] ret_from_fork+0x10/0x20\n\nThe issue here is as follows:\n\n- tidss probes, but is deferred as sii902x is still missing.\n- sii902x starts probing and enters sii902x_init().\n- sii902x calls drm_bridge_add(). Now the sii902x bridge is ready from\n DRM\u0027s perspective.\n- sii902x calls sii902x_audio_codec_init() and\n platform_device_register_data()\n- The registration of the audio platform device causes probing of the\n deferred devices.\n- tidss probes, which eventually causes sii902x_bridge_get_edid() to be\n called.\n- sii902x_bridge_get_edid() tries to use the i2c to read the edid.\n However, the sii902x driver has not set up the i2c part yet, leading\n to the crash.\n\nFix this by moving the drm_bridge_add() to the end of the\nsii902x_init(), which is also at the very end of sii902x_probe().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26607",
"url": "https://www.suse.com/security/cve/CVE-2024-26607"
},
{
"category": "external",
"summary": "SUSE Bug 1220736 for CVE-2024-26607",
"url": "https://bugzilla.suse.com/1220736"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-12T19:46:41Z",
"details": "moderate"
}
],
"title": "CVE-2024-26607"
},
{
"cve": "CVE-2024-26622",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26622"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntomoyo: fix UAF write bug in tomoyo_write_control()\n\nSince tomoyo_write_control() updates head-\u003ewrite_buf when write()\nof long lines is requested, we need to fetch head-\u003ewrite_buf after\nhead-\u003eio_sem is held. Otherwise, concurrent write() requests can\ncause use-after-free-write and double-free problems.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26622",
"url": "https://www.suse.com/security/cve/CVE-2024-26622"
},
{
"category": "external",
"summary": "SUSE Bug 1220825 for CVE-2024-26622",
"url": "https://bugzilla.suse.com/1220825"
},
{
"category": "external",
"summary": "SUSE Bug 1220828 for CVE-2024-26622",
"url": "https://bugzilla.suse.com/1220828"
},
{
"category": "external",
"summary": "SUSE Bug 1224298 for CVE-2024-26622",
"url": "https://bugzilla.suse.com/1224298"
},
{
"category": "external",
"summary": "SUSE Bug 1224878 for CVE-2024-26622",
"url": "https://bugzilla.suse.com/1224878"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.37.1.noarch",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.37.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.37.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-12T19:46:41Z",
"details": "important"
}
],
"title": "CVE-2024-26622"
}
]
}
SUSE-SU-2024:0900-2
Vulnerability from csaf_suse - Published: 2024-03-15 12:19 - Updated: 2024-03-15 12:19Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise 15 SP4 kernel was updated to receive various security bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2023-6270: Fixed a use-after-free issue in aoecmd_cfg_pkts (bsc#1218562).\n- CVE-2023-52463: Fixed null pointer dereference in efivarfs (bsc#1220328).\n- CVE-2023-52559: Fixed a bug by avoiding memory allocation in iommu_suspend (bsc#1220933).\n- CVE-2023-28746: Fixed Register File Data Sampling (bsc#1213456).\n- CVE-2023-52530: Fixed a potential key use-after-free in wifi mac80211 (bsc#1220930).\n- CVE-2024-26607: Fixed a probing race issue in sii902x: (bsc#1220736).\n- CVE-2023-52467: Fixed a null pointer dereference in of_syscon_register (bsc#1220433).\n- CVE-2024-26591: Fixed re-attachment branch in bpf_tracing_prog_attach (bsc#1220254).\n- CVE-2024-26589: Fixed out of bounds read due to variable offset alu on PTR_TO_FLOW_KEYS (bsc#1220255).\n- CVE-2023-52484: Fixed a soft lockup triggered by arm_smmu_mm_invalidate_range (bsc#1220797).\n- CVE-2024-26585: Fixed race between tx work scheduling and socket close (bsc#1220187).\n- CVE-2023-52340: Fixed ICMPv6 \u201cPacket Too Big\u201d packets force a DoS of the Linux kernel by forcing 100% CPU (bsc#1219295).\n- CVE-2024-0607: Fixed 64-bit load issue in nft_byteorder_eval() (bsc#1218915).\n- CVE-2023-6817: Fixed use-after-free in nft_pipapo_walk (bsc#1218195).\n- CVE-2024-26622: Fixed UAF write bug in tomoyo_write_control() (bsc#1220825).\n- CVE-2024-23850: Fixed double free of anonymous device after snapshot creation failure (bsc#1219126).\n- CVE-2023-52452: Fixed Fix accesses to uninit stack slots (bsc#1220257).\n- CVE-2023-52457: Fixed skipped resource freeing if pm_runtime_resume_and_get() failed (bsc#1220350).\n- CVE-2023-52456: Fixed tx statemachine deadlock (bsc#1220364).\n- CVE-2023-52451: Fixed access beyond end of drmem array (bsc#1220250).\n- CVE-2023-52449: Fixed gluebi NULL pointer dereference caused by ftl notifier (bsc#1220238).\n- CVE-2021-46923: Fixed reference leakage in fs/mount_setattr (bsc#1220457).\n- CVE-2023-52447: Fixed map_fd_put_ptr() signature kABI workaround (bsc#1220251).\n- CVE-2024-26598: Fixed potential UAF in LPI translation cache (bsc#1220326).\n- CVE-2024-26603: Fixed infinite loop via #PF handling (bsc#1220335).\n- CVE-2023-52445: Fixed use after free on context disconnection (bsc#1220241).\n- CVE-2023-52439: Fixed use-after-free in uio_open (bsc#1220140).\n- CVE-2023-52443: Fixed crash when parsed profile name is empty (bsc#1220240).\n- CVE-2024-26602: Fixed overall slowdowns with sys_membarrier (bsc1220398).\n- CVE-2024-26593: Fixed block process call transactions (bsc#1220009).\n- CVE-2024-26586: Fixed stack corruption (bsc#1220243).\n- CVE-2024-26595: Fixed NULL pointer dereference in error path (bsc#1220344).\n- CVE-2023-52464: Fixed possible out-of-bounds string access (bsc#1220330)\n- CVE-2023-52448: Fixed kernel NULL pointer dereference in gfs2_rgrp_dump (bsc#1220253).\n- CVE-2024-1151: Fixed unlimited number of recursions from action sets (bsc#1219835).\n- CVE-2023-5197: Fixed se-after-free due to addition and removal of rules from chain bindings within the same transaction (bsc#1218216).\n- CVE-2024-23849: Fixed array-index-out-of-bounds in rds_cmsg_recv (bsc#1219127).\n- CVE-2023-52429: Fixed potential DoS in dm_table_create in drivers/md/dm-table.c (bsc#1219827).\n- CVE-2024-23851: Fixed crash in copy_params in drivers/md/dm-ioctl.c (bsc#1219146).\n\nThe following non-security bugs were fixed:\n\n- bpf: Fix verification of indirect var-off stack access (git-fixes).\n- bpf: Guard stack limits against 32bit overflow (git-fixes).\n- KVM: VMX: Move VERW closer to VMentry for MDS mitigation (git-fixes).\n- KVM: VMX: Use BT+JNC, i.e. EFLAGS.CF to select VMRESUME vs. VMLAUNCH (git-fixes).\n- NFS: avoid infinite loop in pnfs_update_layout (bsc#1219633).\n- nvme: move nvme_stop_keep_alive() back to original position (bsc#1211515).\n- nvme: remove nvme_alloc_request and nvme_alloc_request_qid (bsc#1214064).\n- nvme: start keep-alive after admin queue setup (bsc#1211515).\n- x86/asm: Add _ASM_RIP() macro for x86-64 (%rip) suffix (git-fixes).\n- x86/bugs: Add asm helpers for executing VERW (git-fixes). \n- x86/bugs: Use ALTERNATIVE() instead of mds_user_clear static key (git-fixes).\n- x86/entry_32: Add VERW just before userspace transition (git-fixes).\n- x86/entry_64: Add VERW just before userspace transition (git-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2024-900,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-900,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-900",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_0900-2.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2024:0900-2",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20240900-2/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2024:0900-2",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html"
},
{
"category": "self",
"summary": "SUSE Bug 1211515",
"url": "https://bugzilla.suse.com/1211515"
},
{
"category": "self",
"summary": "SUSE Bug 1213456",
"url": "https://bugzilla.suse.com/1213456"
},
{
"category": "self",
"summary": "SUSE Bug 1214064",
"url": "https://bugzilla.suse.com/1214064"
},
{
"category": "self",
"summary": "SUSE Bug 1218195",
"url": "https://bugzilla.suse.com/1218195"
},
{
"category": "self",
"summary": "SUSE Bug 1218216",
"url": "https://bugzilla.suse.com/1218216"
},
{
"category": "self",
"summary": "SUSE Bug 1218562",
"url": "https://bugzilla.suse.com/1218562"
},
{
"category": "self",
"summary": "SUSE Bug 1218915",
"url": "https://bugzilla.suse.com/1218915"
},
{
"category": "self",
"summary": "SUSE Bug 1219073",
"url": "https://bugzilla.suse.com/1219073"
},
{
"category": "self",
"summary": "SUSE Bug 1219126",
"url": "https://bugzilla.suse.com/1219126"
},
{
"category": "self",
"summary": "SUSE Bug 1219127",
"url": "https://bugzilla.suse.com/1219127"
},
{
"category": "self",
"summary": "SUSE Bug 1219146",
"url": "https://bugzilla.suse.com/1219146"
},
{
"category": "self",
"summary": "SUSE Bug 1219295",
"url": "https://bugzilla.suse.com/1219295"
},
{
"category": "self",
"summary": "SUSE Bug 1219633",
"url": "https://bugzilla.suse.com/1219633"
},
{
"category": "self",
"summary": "SUSE Bug 1219653",
"url": "https://bugzilla.suse.com/1219653"
},
{
"category": "self",
"summary": "SUSE Bug 1219827",
"url": "https://bugzilla.suse.com/1219827"
},
{
"category": "self",
"summary": "SUSE Bug 1219835",
"url": "https://bugzilla.suse.com/1219835"
},
{
"category": "self",
"summary": "SUSE Bug 1220009",
"url": "https://bugzilla.suse.com/1220009"
},
{
"category": "self",
"summary": "SUSE Bug 1220140",
"url": "https://bugzilla.suse.com/1220140"
},
{
"category": "self",
"summary": "SUSE Bug 1220187",
"url": "https://bugzilla.suse.com/1220187"
},
{
"category": "self",
"summary": "SUSE Bug 1220238",
"url": "https://bugzilla.suse.com/1220238"
},
{
"category": "self",
"summary": "SUSE Bug 1220240",
"url": "https://bugzilla.suse.com/1220240"
},
{
"category": "self",
"summary": "SUSE Bug 1220241",
"url": "https://bugzilla.suse.com/1220241"
},
{
"category": "self",
"summary": "SUSE Bug 1220243",
"url": "https://bugzilla.suse.com/1220243"
},
{
"category": "self",
"summary": "SUSE Bug 1220250",
"url": "https://bugzilla.suse.com/1220250"
},
{
"category": "self",
"summary": "SUSE Bug 1220251",
"url": "https://bugzilla.suse.com/1220251"
},
{
"category": "self",
"summary": "SUSE Bug 1220253",
"url": "https://bugzilla.suse.com/1220253"
},
{
"category": "self",
"summary": "SUSE Bug 1220254",
"url": "https://bugzilla.suse.com/1220254"
},
{
"category": "self",
"summary": "SUSE Bug 1220255",
"url": "https://bugzilla.suse.com/1220255"
},
{
"category": "self",
"summary": "SUSE Bug 1220257",
"url": "https://bugzilla.suse.com/1220257"
},
{
"category": "self",
"summary": "SUSE Bug 1220326",
"url": "https://bugzilla.suse.com/1220326"
},
{
"category": "self",
"summary": "SUSE Bug 1220328",
"url": "https://bugzilla.suse.com/1220328"
},
{
"category": "self",
"summary": "SUSE Bug 1220330",
"url": "https://bugzilla.suse.com/1220330"
},
{
"category": "self",
"summary": "SUSE Bug 1220335",
"url": "https://bugzilla.suse.com/1220335"
},
{
"category": "self",
"summary": "SUSE Bug 1220344",
"url": "https://bugzilla.suse.com/1220344"
},
{
"category": "self",
"summary": "SUSE Bug 1220350",
"url": "https://bugzilla.suse.com/1220350"
},
{
"category": "self",
"summary": "SUSE Bug 1220364",
"url": "https://bugzilla.suse.com/1220364"
},
{
"category": "self",
"summary": "SUSE Bug 1220398",
"url": "https://bugzilla.suse.com/1220398"
},
{
"category": "self",
"summary": "SUSE Bug 1220409",
"url": "https://bugzilla.suse.com/1220409"
},
{
"category": "self",
"summary": "SUSE Bug 1220433",
"url": "https://bugzilla.suse.com/1220433"
},
{
"category": "self",
"summary": "SUSE Bug 1220444",
"url": "https://bugzilla.suse.com/1220444"
},
{
"category": "self",
"summary": "SUSE Bug 1220457",
"url": "https://bugzilla.suse.com/1220457"
},
{
"category": "self",
"summary": "SUSE Bug 1220459",
"url": "https://bugzilla.suse.com/1220459"
},
{
"category": "self",
"summary": "SUSE Bug 1220469",
"url": "https://bugzilla.suse.com/1220469"
},
{
"category": "self",
"summary": "SUSE Bug 1220649",
"url": "https://bugzilla.suse.com/1220649"
},
{
"category": "self",
"summary": "SUSE Bug 1220735",
"url": "https://bugzilla.suse.com/1220735"
},
{
"category": "self",
"summary": "SUSE Bug 1220736",
"url": "https://bugzilla.suse.com/1220736"
},
{
"category": "self",
"summary": "SUSE Bug 1220796",
"url": "https://bugzilla.suse.com/1220796"
},
{
"category": "self",
"summary": "SUSE Bug 1220797",
"url": "https://bugzilla.suse.com/1220797"
},
{
"category": "self",
"summary": "SUSE Bug 1220825",
"url": "https://bugzilla.suse.com/1220825"
},
{
"category": "self",
"summary": "SUSE Bug 1220845",
"url": "https://bugzilla.suse.com/1220845"
},
{
"category": "self",
"summary": "SUSE Bug 1220917",
"url": "https://bugzilla.suse.com/1220917"
},
{
"category": "self",
"summary": "SUSE Bug 1220930",
"url": "https://bugzilla.suse.com/1220930"
},
{
"category": "self",
"summary": "SUSE Bug 1220931",
"url": "https://bugzilla.suse.com/1220931"
},
{
"category": "self",
"summary": "SUSE Bug 1220933",
"url": "https://bugzilla.suse.com/1220933"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-25162 page",
"url": "https://www.suse.com/security/cve/CVE-2019-25162/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-46923 page",
"url": "https://www.suse.com/security/cve/CVE-2021-46923/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-46924 page",
"url": "https://www.suse.com/security/cve/CVE-2021-46924/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-46932 page",
"url": "https://www.suse.com/security/cve/CVE-2021-46932/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-46934 page",
"url": "https://www.suse.com/security/cve/CVE-2021-46934/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47083 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47083/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48627 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48627/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-28746 page",
"url": "https://www.suse.com/security/cve/CVE-2023-28746/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-5197 page",
"url": "https://www.suse.com/security/cve/CVE-2023-5197/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52340 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52340/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52429 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52429/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52439 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52439/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52443 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52443/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52445 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52445/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52447 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52447/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52448 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52448/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52449 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52449/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52451 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52451/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52452 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52452/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52456 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52456/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52457 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52457/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52463 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52463/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52464 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52464/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52467 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52467/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52475 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52475/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52478 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52478/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52482 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52482/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52484 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52484/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52530 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52530/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52531 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52531/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52559 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52559/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-6270 page",
"url": "https://www.suse.com/security/cve/CVE-2023-6270/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-6817 page",
"url": "https://www.suse.com/security/cve/CVE-2023-6817/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-0607 page",
"url": "https://www.suse.com/security/cve/CVE-2024-0607/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-1151 page",
"url": "https://www.suse.com/security/cve/CVE-2024-1151/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-23849 page",
"url": "https://www.suse.com/security/cve/CVE-2024-23849/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-23850 page",
"url": "https://www.suse.com/security/cve/CVE-2024-23850/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-23851 page",
"url": "https://www.suse.com/security/cve/CVE-2024-23851/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26585 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26585/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26586 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26589 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26589/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26591 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26591/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26593 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26593/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26595 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26595/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26598 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26598/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26602 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26602/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26603 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26603/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26607 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26607/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26622 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26622/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2024-03-15T12:19:06Z",
"generator": {
"date": "2024-03-15T12:19:06Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2024:0900-2",
"initial_release_date": "2024-03-15T12:19:06Z",
"revision_history": [
{
"date": "2024-03-15T12:19:06Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-64kb-5.14.21-150400.24.111.2.aarch64",
"product": {
"name": "cluster-md-kmp-64kb-5.14.21-150400.24.111.2.aarch64",
"product_id": "cluster-md-kmp-64kb-5.14.21-150400.24.111.2.aarch64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"product": {
"name": "cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"product_id": "cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-64kb-5.14.21-150400.24.111.2.aarch64",
"product": {
"name": "dlm-kmp-64kb-5.14.21-150400.24.111.2.aarch64",
"product_id": "dlm-kmp-64kb-5.14.21-150400.24.111.2.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"product": {
"name": "dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"product_id": "dlm-kmp-default-5.14.21-150400.24.111.2.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-allwinner-5.14.21-150400.24.111.1.aarch64",
"product": {
"name": "dtb-allwinner-5.14.21-150400.24.111.1.aarch64",
"product_id": "dtb-allwinner-5.14.21-150400.24.111.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-altera-5.14.21-150400.24.111.1.aarch64",
"product": {
"name": "dtb-altera-5.14.21-150400.24.111.1.aarch64",
"product_id": "dtb-altera-5.14.21-150400.24.111.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-amazon-5.14.21-150400.24.111.1.aarch64",
"product": {
"name": "dtb-amazon-5.14.21-150400.24.111.1.aarch64",
"product_id": "dtb-amazon-5.14.21-150400.24.111.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-amd-5.14.21-150400.24.111.1.aarch64",
"product": {
"name": "dtb-amd-5.14.21-150400.24.111.1.aarch64",
"product_id": "dtb-amd-5.14.21-150400.24.111.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-amlogic-5.14.21-150400.24.111.1.aarch64",
"product": {
"name": "dtb-amlogic-5.14.21-150400.24.111.1.aarch64",
"product_id": "dtb-amlogic-5.14.21-150400.24.111.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-apm-5.14.21-150400.24.111.1.aarch64",
"product": {
"name": "dtb-apm-5.14.21-150400.24.111.1.aarch64",
"product_id": "dtb-apm-5.14.21-150400.24.111.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-apple-5.14.21-150400.24.111.1.aarch64",
"product": {
"name": "dtb-apple-5.14.21-150400.24.111.1.aarch64",
"product_id": "dtb-apple-5.14.21-150400.24.111.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-arm-5.14.21-150400.24.111.1.aarch64",
"product": {
"name": "dtb-arm-5.14.21-150400.24.111.1.aarch64",
"product_id": "dtb-arm-5.14.21-150400.24.111.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-broadcom-5.14.21-150400.24.111.1.aarch64",
"product": {
"name": "dtb-broadcom-5.14.21-150400.24.111.1.aarch64",
"product_id": "dtb-broadcom-5.14.21-150400.24.111.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-cavium-5.14.21-150400.24.111.1.aarch64",
"product": {
"name": "dtb-cavium-5.14.21-150400.24.111.1.aarch64",
"product_id": "dtb-cavium-5.14.21-150400.24.111.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-exynos-5.14.21-150400.24.111.1.aarch64",
"product": {
"name": "dtb-exynos-5.14.21-150400.24.111.1.aarch64",
"product_id": "dtb-exynos-5.14.21-150400.24.111.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-freescale-5.14.21-150400.24.111.1.aarch64",
"product": {
"name": "dtb-freescale-5.14.21-150400.24.111.1.aarch64",
"product_id": "dtb-freescale-5.14.21-150400.24.111.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-hisilicon-5.14.21-150400.24.111.1.aarch64",
"product": {
"name": "dtb-hisilicon-5.14.21-150400.24.111.1.aarch64",
"product_id": "dtb-hisilicon-5.14.21-150400.24.111.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-lg-5.14.21-150400.24.111.1.aarch64",
"product": {
"name": "dtb-lg-5.14.21-150400.24.111.1.aarch64",
"product_id": "dtb-lg-5.14.21-150400.24.111.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-marvell-5.14.21-150400.24.111.1.aarch64",
"product": {
"name": "dtb-marvell-5.14.21-150400.24.111.1.aarch64",
"product_id": "dtb-marvell-5.14.21-150400.24.111.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-mediatek-5.14.21-150400.24.111.1.aarch64",
"product": {
"name": "dtb-mediatek-5.14.21-150400.24.111.1.aarch64",
"product_id": "dtb-mediatek-5.14.21-150400.24.111.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-nvidia-5.14.21-150400.24.111.1.aarch64",
"product": {
"name": "dtb-nvidia-5.14.21-150400.24.111.1.aarch64",
"product_id": "dtb-nvidia-5.14.21-150400.24.111.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-qcom-5.14.21-150400.24.111.1.aarch64",
"product": {
"name": "dtb-qcom-5.14.21-150400.24.111.1.aarch64",
"product_id": "dtb-qcom-5.14.21-150400.24.111.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-renesas-5.14.21-150400.24.111.1.aarch64",
"product": {
"name": "dtb-renesas-5.14.21-150400.24.111.1.aarch64",
"product_id": "dtb-renesas-5.14.21-150400.24.111.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-rockchip-5.14.21-150400.24.111.1.aarch64",
"product": {
"name": "dtb-rockchip-5.14.21-150400.24.111.1.aarch64",
"product_id": "dtb-rockchip-5.14.21-150400.24.111.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-socionext-5.14.21-150400.24.111.1.aarch64",
"product": {
"name": "dtb-socionext-5.14.21-150400.24.111.1.aarch64",
"product_id": "dtb-socionext-5.14.21-150400.24.111.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-sprd-5.14.21-150400.24.111.1.aarch64",
"product": {
"name": "dtb-sprd-5.14.21-150400.24.111.1.aarch64",
"product_id": "dtb-sprd-5.14.21-150400.24.111.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-xilinx-5.14.21-150400.24.111.1.aarch64",
"product": {
"name": "dtb-xilinx-5.14.21-150400.24.111.1.aarch64",
"product_id": "dtb-xilinx-5.14.21-150400.24.111.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-64kb-5.14.21-150400.24.111.2.aarch64",
"product": {
"name": "gfs2-kmp-64kb-5.14.21-150400.24.111.2.aarch64",
"product_id": "gfs2-kmp-64kb-5.14.21-150400.24.111.2.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"product": {
"name": "gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"product_id": "gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"product": {
"name": "kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"product_id": "kernel-64kb-5.14.21-150400.24.111.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"product": {
"name": "kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"product_id": "kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-extra-5.14.21-150400.24.111.2.aarch64",
"product": {
"name": "kernel-64kb-extra-5.14.21-150400.24.111.2.aarch64",
"product_id": "kernel-64kb-extra-5.14.21-150400.24.111.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-livepatch-devel-5.14.21-150400.24.111.2.aarch64",
"product": {
"name": "kernel-64kb-livepatch-devel-5.14.21-150400.24.111.2.aarch64",
"product_id": "kernel-64kb-livepatch-devel-5.14.21-150400.24.111.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-optional-5.14.21-150400.24.111.2.aarch64",
"product": {
"name": "kernel-64kb-optional-5.14.21-150400.24.111.2.aarch64",
"product_id": "kernel-64kb-optional-5.14.21-150400.24.111.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-5.14.21-150400.24.111.2.aarch64",
"product": {
"name": "kernel-default-5.14.21-150400.24.111.2.aarch64",
"product_id": "kernel-default-5.14.21-150400.24.111.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"product": {
"name": "kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"product_id": "kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"product": {
"name": "kernel-default-base-rebuild-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"product_id": "kernel-default-base-rebuild-5.14.21-150400.24.111.2.150400.24.52.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"product": {
"name": "kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"product_id": "kernel-default-devel-5.14.21-150400.24.111.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.14.21-150400.24.111.2.aarch64",
"product": {
"name": "kernel-default-extra-5.14.21-150400.24.111.2.aarch64",
"product_id": "kernel-default-extra-5.14.21-150400.24.111.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.14.21-150400.24.111.2.aarch64",
"product": {
"name": "kernel-default-livepatch-5.14.21-150400.24.111.2.aarch64",
"product_id": "kernel-default-livepatch-5.14.21-150400.24.111.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.14.21-150400.24.111.2.aarch64",
"product": {
"name": "kernel-default-livepatch-devel-5.14.21-150400.24.111.2.aarch64",
"product_id": "kernel-default-livepatch-devel-5.14.21-150400.24.111.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-5.14.21-150400.24.111.2.aarch64",
"product": {
"name": "kernel-default-optional-5.14.21-150400.24.111.2.aarch64",
"product_id": "kernel-default-optional-5.14.21-150400.24.111.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-5.14.21-150400.24.111.2.aarch64",
"product": {
"name": "kernel-kvmsmall-5.14.21-150400.24.111.2.aarch64",
"product_id": "kernel-kvmsmall-5.14.21-150400.24.111.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-5.14.21-150400.24.111.2.aarch64",
"product": {
"name": "kernel-kvmsmall-devel-5.14.21-150400.24.111.2.aarch64",
"product_id": "kernel-kvmsmall-devel-5.14.21-150400.24.111.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.111.2.aarch64",
"product": {
"name": "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.111.2.aarch64",
"product_id": "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.111.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"product": {
"name": "kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"product_id": "kernel-obs-build-5.14.21-150400.24.111.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.14.21-150400.24.111.1.aarch64",
"product": {
"name": "kernel-obs-qa-5.14.21-150400.24.111.1.aarch64",
"product_id": "kernel-obs-qa-5.14.21-150400.24.111.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.14.21-150400.24.111.1.aarch64",
"product": {
"name": "kernel-syms-5.14.21-150400.24.111.1.aarch64",
"product_id": "kernel-syms-5.14.21-150400.24.111.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-64kb-5.14.21-150400.24.111.2.aarch64",
"product": {
"name": "kselftests-kmp-64kb-5.14.21-150400.24.111.2.aarch64",
"product_id": "kselftests-kmp-64kb-5.14.21-150400.24.111.2.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.14.21-150400.24.111.2.aarch64",
"product": {
"name": "kselftests-kmp-default-5.14.21-150400.24.111.2.aarch64",
"product_id": "kselftests-kmp-default-5.14.21-150400.24.111.2.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-64kb-5.14.21-150400.24.111.2.aarch64",
"product": {
"name": "ocfs2-kmp-64kb-5.14.21-150400.24.111.2.aarch64",
"product_id": "ocfs2-kmp-64kb-5.14.21-150400.24.111.2.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"product": {
"name": "ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"product_id": "ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-64kb-5.14.21-150400.24.111.2.aarch64",
"product": {
"name": "reiserfs-kmp-64kb-5.14.21-150400.24.111.2.aarch64",
"product_id": "reiserfs-kmp-64kb-5.14.21-150400.24.111.2.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"product": {
"name": "reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"product_id": "reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-5.14.21-150400.24.111.1.noarch",
"product": {
"name": "kernel-devel-5.14.21-150400.24.111.1.noarch",
"product_id": "kernel-devel-5.14.21-150400.24.111.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-5.14.21-150400.24.111.2.noarch",
"product": {
"name": "kernel-docs-5.14.21-150400.24.111.2.noarch",
"product_id": "kernel-docs-5.14.21-150400.24.111.2.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-5.14.21-150400.24.111.2.noarch",
"product": {
"name": "kernel-docs-html-5.14.21-150400.24.111.2.noarch",
"product_id": "kernel-docs-html-5.14.21-150400.24.111.2.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-5.14.21-150400.24.111.1.noarch",
"product": {
"name": "kernel-macros-5.14.21-150400.24.111.1.noarch",
"product_id": "kernel-macros-5.14.21-150400.24.111.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-5.14.21-150400.24.111.1.noarch",
"product": {
"name": "kernel-source-5.14.21-150400.24.111.1.noarch",
"product_id": "kernel-source-5.14.21-150400.24.111.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-5.14.21-150400.24.111.1.noarch",
"product": {
"name": "kernel-source-vanilla-5.14.21-150400.24.111.1.noarch",
"product_id": "kernel-source-vanilla-5.14.21-150400.24.111.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"product": {
"name": "cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"product_id": "cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"product": {
"name": "dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"product_id": "dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"product": {
"name": "gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"product_id": "gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-5.14.21-150400.24.111.2.ppc64le",
"product": {
"name": "kernel-debug-5.14.21-150400.24.111.2.ppc64le",
"product_id": "kernel-debug-5.14.21-150400.24.111.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-5.14.21-150400.24.111.2.ppc64le",
"product": {
"name": "kernel-debug-devel-5.14.21-150400.24.111.2.ppc64le",
"product_id": "kernel-debug-devel-5.14.21-150400.24.111.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"product": {
"name": "kernel-debug-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"product_id": "kernel-debug-livepatch-devel-5.14.21-150400.24.111.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-5.14.21-150400.24.111.2.ppc64le",
"product": {
"name": "kernel-default-5.14.21-150400.24.111.2.ppc64le",
"product_id": "kernel-default-5.14.21-150400.24.111.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"product": {
"name": "kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"product_id": "kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"product": {
"name": "kernel-default-base-rebuild-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"product_id": "kernel-default-base-rebuild-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"product": {
"name": "kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"product_id": "kernel-default-devel-5.14.21-150400.24.111.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.14.21-150400.24.111.2.ppc64le",
"product": {
"name": "kernel-default-extra-5.14.21-150400.24.111.2.ppc64le",
"product_id": "kernel-default-extra-5.14.21-150400.24.111.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"product": {
"name": "kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"product_id": "kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"product": {
"name": "kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"product_id": "kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-5.14.21-150400.24.111.2.ppc64le",
"product": {
"name": "kernel-default-optional-5.14.21-150400.24.111.2.ppc64le",
"product_id": "kernel-default-optional-5.14.21-150400.24.111.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-5.14.21-150400.24.111.2.ppc64le",
"product": {
"name": "kernel-kvmsmall-5.14.21-150400.24.111.2.ppc64le",
"product_id": "kernel-kvmsmall-5.14.21-150400.24.111.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-5.14.21-150400.24.111.2.ppc64le",
"product": {
"name": "kernel-kvmsmall-devel-5.14.21-150400.24.111.2.ppc64le",
"product_id": "kernel-kvmsmall-devel-5.14.21-150400.24.111.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"product": {
"name": "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"product_id": "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.111.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"product": {
"name": "kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"product_id": "kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"product": {
"name": "kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"product_id": "kernel-obs-build-5.14.21-150400.24.111.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.14.21-150400.24.111.1.ppc64le",
"product": {
"name": "kernel-obs-qa-5.14.21-150400.24.111.1.ppc64le",
"product_id": "kernel-obs-qa-5.14.21-150400.24.111.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"product": {
"name": "kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"product_id": "kernel-syms-5.14.21-150400.24.111.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"product": {
"name": "kselftests-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"product_id": "kselftests-kmp-default-5.14.21-150400.24.111.2.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"product": {
"name": "ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"product_id": "ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"product": {
"name": "reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"product_id": "reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"product": {
"name": "cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"product_id": "cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"product": {
"name": "dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"product_id": "dlm-kmp-default-5.14.21-150400.24.111.2.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"product": {
"name": "gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"product_id": "gfs2-kmp-default-5.14.21-150400.24.111.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-5.14.21-150400.24.111.2.s390x",
"product": {
"name": "kernel-default-5.14.21-150400.24.111.2.s390x",
"product_id": "kernel-default-5.14.21-150400.24.111.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"product": {
"name": "kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"product_id": "kernel-default-devel-5.14.21-150400.24.111.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.14.21-150400.24.111.2.s390x",
"product": {
"name": "kernel-default-extra-5.14.21-150400.24.111.2.s390x",
"product_id": "kernel-default-extra-5.14.21-150400.24.111.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"product": {
"name": "kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"product_id": "kernel-default-livepatch-5.14.21-150400.24.111.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"product": {
"name": "kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"product_id": "kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-5.14.21-150400.24.111.2.s390x",
"product": {
"name": "kernel-default-optional-5.14.21-150400.24.111.2.s390x",
"product_id": "kernel-default-optional-5.14.21-150400.24.111.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"product": {
"name": "kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"product_id": "kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"product": {
"name": "kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"product_id": "kernel-obs-build-5.14.21-150400.24.111.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.14.21-150400.24.111.1.s390x",
"product": {
"name": "kernel-obs-qa-5.14.21-150400.24.111.1.s390x",
"product_id": "kernel-obs-qa-5.14.21-150400.24.111.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.14.21-150400.24.111.1.s390x",
"product": {
"name": "kernel-syms-5.14.21-150400.24.111.1.s390x",
"product_id": "kernel-syms-5.14.21-150400.24.111.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"product": {
"name": "kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"product_id": "kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.14.21-150400.24.111.2.s390x",
"product": {
"name": "kselftests-kmp-default-5.14.21-150400.24.111.2.s390x",
"product_id": "kselftests-kmp-default-5.14.21-150400.24.111.2.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"product": {
"name": "ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"product_id": "ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"product": {
"name": "reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"product_id": "reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"product": {
"name": "cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"product_id": "cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"product": {
"name": "dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"product_id": "dlm-kmp-default-5.14.21-150400.24.111.2.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"product": {
"name": "gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"product_id": "gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-5.14.21-150400.24.111.2.x86_64",
"product": {
"name": "kernel-debug-5.14.21-150400.24.111.2.x86_64",
"product_id": "kernel-debug-5.14.21-150400.24.111.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-5.14.21-150400.24.111.2.x86_64",
"product": {
"name": "kernel-debug-devel-5.14.21-150400.24.111.2.x86_64",
"product_id": "kernel-debug-devel-5.14.21-150400.24.111.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"product": {
"name": "kernel-debug-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"product_id": "kernel-debug-livepatch-devel-5.14.21-150400.24.111.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-5.14.21-150400.24.111.2.x86_64",
"product": {
"name": "kernel-default-5.14.21-150400.24.111.2.x86_64",
"product_id": "kernel-default-5.14.21-150400.24.111.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"product": {
"name": "kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"product_id": "kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"product": {
"name": "kernel-default-base-rebuild-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"product_id": "kernel-default-base-rebuild-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"product": {
"name": "kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"product_id": "kernel-default-devel-5.14.21-150400.24.111.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.14.21-150400.24.111.2.x86_64",
"product": {
"name": "kernel-default-extra-5.14.21-150400.24.111.2.x86_64",
"product_id": "kernel-default-extra-5.14.21-150400.24.111.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"product": {
"name": "kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"product_id": "kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"product": {
"name": "kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"product_id": "kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-5.14.21-150400.24.111.2.x86_64",
"product": {
"name": "kernel-default-optional-5.14.21-150400.24.111.2.x86_64",
"product_id": "kernel-default-optional-5.14.21-150400.24.111.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-5.14.21-150400.24.111.2.x86_64",
"product": {
"name": "kernel-kvmsmall-5.14.21-150400.24.111.2.x86_64",
"product_id": "kernel-kvmsmall-5.14.21-150400.24.111.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-5.14.21-150400.24.111.2.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-5.14.21-150400.24.111.2.x86_64",
"product_id": "kernel-kvmsmall-devel-5.14.21-150400.24.111.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"product": {
"name": "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"product_id": "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.111.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"product": {
"name": "kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"product_id": "kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"product": {
"name": "kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"product_id": "kernel-obs-build-5.14.21-150400.24.111.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.14.21-150400.24.111.1.x86_64",
"product": {
"name": "kernel-obs-qa-5.14.21-150400.24.111.1.x86_64",
"product_id": "kernel-obs-qa-5.14.21-150400.24.111.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.14.21-150400.24.111.1.x86_64",
"product": {
"name": "kernel-syms-5.14.21-150400.24.111.1.x86_64",
"product_id": "kernel-syms-5.14.21-150400.24.111.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.14.21-150400.24.111.2.x86_64",
"product": {
"name": "kselftests-kmp-default-5.14.21-150400.24.111.2.x86_64",
"product_id": "kselftests-kmp-default-5.14.21-150400.24.111.2.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"product": {
"name": "ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"product_id": "ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"product": {
"name": "reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"product_id": "reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Manager Proxy 4.3",
"product": {
"name": "SUSE Manager Proxy 4.3",
"product_id": "SUSE Manager Proxy 4.3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-manager-proxy:4.3"
}
}
},
{
"category": "product_name",
"name": "SUSE Manager Server 4.3",
"product": {
"name": "SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-manager-server:4.3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.14.21-150400.24.111.2.x86_64 as component of SUSE Manager Proxy 4.3",
"product_id": "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64"
},
"product_reference": "kernel-default-5.14.21-150400.24.111.2.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64 as component of SUSE Manager Proxy 4.3",
"product_id": "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
},
"product_reference": "kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.14.21-150400.24.111.2.x86_64 as component of SUSE Manager Proxy 4.3",
"product_id": "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64"
},
"product_reference": "kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.14.21-150400.24.111.1.noarch as component of SUSE Manager Proxy 4.3",
"product_id": "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch"
},
"product_reference": "kernel-devel-5.14.21-150400.24.111.1.noarch",
"relates_to_product_reference": "SUSE Manager Proxy 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.14.21-150400.24.111.1.noarch as component of SUSE Manager Proxy 4.3",
"product_id": "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch"
},
"product_reference": "kernel-macros-5.14.21-150400.24.111.1.noarch",
"relates_to_product_reference": "SUSE Manager Proxy 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.14.21-150400.24.111.1.noarch as component of SUSE Manager Proxy 4.3",
"product_id": "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch"
},
"product_reference": "kernel-source-5.14.21-150400.24.111.1.noarch",
"relates_to_product_reference": "SUSE Manager Proxy 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.14.21-150400.24.111.1.x86_64 as component of SUSE Manager Proxy 4.3",
"product_id": "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64"
},
"product_reference": "kernel-syms-5.14.21-150400.24.111.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.14.21-150400.24.111.2.ppc64le as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le"
},
"product_reference": "kernel-default-5.14.21-150400.24.111.2.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.14.21-150400.24.111.2.s390x as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x"
},
"product_reference": "kernel-default-5.14.21-150400.24.111.2.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.14.21-150400.24.111.2.x86_64 as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64"
},
"product_reference": "kernel-default-5.14.21-150400.24.111.2.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le"
},
"product_reference": "kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64 as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
},
"product_reference": "kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.14.21-150400.24.111.2.ppc64le as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le"
},
"product_reference": "kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.14.21-150400.24.111.2.s390x as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x"
},
"product_reference": "kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.14.21-150400.24.111.2.x86_64 as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64"
},
"product_reference": "kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.14.21-150400.24.111.1.noarch as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch"
},
"product_reference": "kernel-devel-5.14.21-150400.24.111.1.noarch",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.14.21-150400.24.111.1.noarch as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch"
},
"product_reference": "kernel-macros-5.14.21-150400.24.111.1.noarch",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.14.21-150400.24.111.1.noarch as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch"
},
"product_reference": "kernel-source-5.14.21-150400.24.111.1.noarch",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.14.21-150400.24.111.1.ppc64le as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le"
},
"product_reference": "kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.14.21-150400.24.111.1.s390x as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x"
},
"product_reference": "kernel-syms-5.14.21-150400.24.111.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.14.21-150400.24.111.1.x86_64 as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64"
},
"product_reference": "kernel-syms-5.14.21-150400.24.111.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-5.14.21-150400.24.111.2.s390x as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
},
"product_reference": "kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-25162",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-25162"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ni2c: Fix a potential use after free\n\nFree the adap structure only after we are done using it.\nThis patch just moves the put_device() down a bit to avoid the\nuse after free.\n\n[wsa: added comment to the code, added Fixes tag]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-25162",
"url": "https://www.suse.com/security/cve/CVE-2019-25162"
},
{
"category": "external",
"summary": "SUSE Bug 1220409 for CVE-2019-25162",
"url": "https://bugzilla.suse.com/1220409"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-15T12:19:06Z",
"details": "moderate"
}
],
"title": "CVE-2019-25162"
},
{
"cve": "CVE-2021-46923",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-46923"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs/mount_setattr: always cleanup mount_kattr\n\nMake sure that finish_mount_kattr() is called after mount_kattr was\nsuccesfully built in both the success and failure case to prevent\nleaking any references we took when we built it. We returned early if\npath lookup failed thereby risking to leak an additional reference we\ntook when building mount_kattr when an idmapped mount was requested.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-46923",
"url": "https://www.suse.com/security/cve/CVE-2021-46923"
},
{
"category": "external",
"summary": "SUSE Bug 1220457 for CVE-2021-46923",
"url": "https://bugzilla.suse.com/1220457"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-15T12:19:06Z",
"details": "low"
}
],
"title": "CVE-2021-46923"
},
{
"cve": "CVE-2021-46924",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-46924"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFC: st21nfca: Fix memory leak in device probe and remove\n\n\u0027phy-\u003epending_skb\u0027 is alloced when device probe, but forgot to free\nin the error handling path and remove path, this cause memory leak\nas follows:\n\nunreferenced object 0xffff88800bc06800 (size 512):\n comm \"8\", pid 11775, jiffies 4295159829 (age 9.032s)\n hex dump (first 32 bytes):\n 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\n 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\n backtrace:\n [\u003c00000000d66c09ce\u003e] __kmalloc_node_track_caller+0x1ed/0x450\n [\u003c00000000c93382b3\u003e] kmalloc_reserve+0x37/0xd0\n [\u003c000000005fea522c\u003e] __alloc_skb+0x124/0x380\n [\u003c0000000019f29f9a\u003e] st21nfca_hci_i2c_probe+0x170/0x8f2\n\nFix it by freeing \u0027pending_skb\u0027 in error and remove.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-46924",
"url": "https://www.suse.com/security/cve/CVE-2021-46924"
},
{
"category": "external",
"summary": "SUSE Bug 1220459 for CVE-2021-46924",
"url": "https://bugzilla.suse.com/1220459"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-15T12:19:06Z",
"details": "moderate"
}
],
"title": "CVE-2021-46924"
},
{
"cve": "CVE-2021-46932",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-46932"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nInput: appletouch - initialize work before device registration\n\nSyzbot has reported warning in __flush_work(). This warning is caused by\nwork-\u003efunc == NULL, which means missing work initialization.\n\nThis may happen, since input_dev-\u003eclose() calls\ncancel_work_sync(\u0026dev-\u003ework), but dev-\u003ework initalization happens _after_\ninput_register_device() call.\n\nSo this patch moves dev-\u003ework initialization before registering input\ndevice",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-46932",
"url": "https://www.suse.com/security/cve/CVE-2021-46932"
},
{
"category": "external",
"summary": "SUSE Bug 1220444 for CVE-2021-46932",
"url": "https://bugzilla.suse.com/1220444"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-15T12:19:06Z",
"details": "moderate"
}
],
"title": "CVE-2021-46932"
},
{
"cve": "CVE-2021-46934",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-46934"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ni2c: validate user data in compat ioctl\n\nWrong user data may cause warning in i2c_transfer(), ex: zero msgs.\nUserspace should not be able to trigger warnings, so this patch adds\nvalidation checks for user data in compact ioctl to prevent reported\nwarnings",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-46934",
"url": "https://www.suse.com/security/cve/CVE-2021-46934"
},
{
"category": "external",
"summary": "SUSE Bug 1220469 for CVE-2021-46934",
"url": "https://bugzilla.suse.com/1220469"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-15T12:19:06Z",
"details": "low"
}
],
"title": "CVE-2021-46934"
},
{
"cve": "CVE-2021-47083",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47083"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npinctrl: mediatek: fix global-out-of-bounds issue\n\nWhen eint virtual eint number is greater than gpio number,\nit maybe produce \u0027desc[eint_n]\u0027 size globle-out-of-bounds issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47083",
"url": "https://www.suse.com/security/cve/CVE-2021-47083"
},
{
"category": "external",
"summary": "SUSE Bug 1220917 for CVE-2021-47083",
"url": "https://bugzilla.suse.com/1220917"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L",
"version": "3.1"
},
"products": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-15T12:19:06Z",
"details": "moderate"
}
],
"title": "CVE-2021-47083"
},
{
"cve": "CVE-2022-48627",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48627"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvt: fix memory overlapping when deleting chars in the buffer\n\nA memory overlapping copy occurs when deleting a long line. This memory\noverlapping copy can cause data corruption when scr_memcpyw is optimized\nto memcpy because memcpy does not ensure its behavior if the destination\nbuffer overlaps with the source buffer. The line buffer is not always\nbroken, because the memcpy utilizes the hardware acceleration, whose\nresult is not deterministic.\n\nFix this problem by using replacing the scr_memcpyw with scr_memmovew.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48627",
"url": "https://www.suse.com/security/cve/CVE-2022-48627"
},
{
"category": "external",
"summary": "SUSE Bug 1220845 for CVE-2022-48627",
"url": "https://bugzilla.suse.com/1220845"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-15T12:19:06Z",
"details": "moderate"
}
],
"title": "CVE-2022-48627"
},
{
"cve": "CVE-2023-28746",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-28746"
}
],
"notes": [
{
"category": "general",
"text": "Information exposure through microarchitectural state after transient execution from some register files for some Intel(R) Atom(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-28746",
"url": "https://www.suse.com/security/cve/CVE-2023-28746"
},
{
"category": "external",
"summary": "SUSE Bug 1213456 for CVE-2023-28746",
"url": "https://bugzilla.suse.com/1213456"
},
{
"category": "external",
"summary": "SUSE Bug 1221323 for CVE-2023-28746",
"url": "https://bugzilla.suse.com/1221323"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-15T12:19:06Z",
"details": "moderate"
}
],
"title": "CVE-2023-28746"
},
{
"cve": "CVE-2023-5197",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-5197"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free vulnerability in the Linux kernel\u0027s netfilter: nf_tables component can be exploited to achieve local privilege escalation.\n\nAddition and removal of rules from chain bindings within the same transaction causes leads to use-after-free.\n\nWe recommend upgrading past commit f15f29fd4779be8a418b66e9d52979bb6d6c2325.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-5197",
"url": "https://www.suse.com/security/cve/CVE-2023-5197"
},
{
"category": "external",
"summary": "SUSE Bug 1218216 for CVE-2023-5197",
"url": "https://bugzilla.suse.com/1218216"
},
{
"category": "external",
"summary": "SUSE Bug 1245974 for CVE-2023-5197",
"url": "https://bugzilla.suse.com/1245974"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-15T12:19:06Z",
"details": "important"
}
],
"title": "CVE-2023-5197"
},
{
"cve": "CVE-2023-52340",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52340"
}
],
"notes": [
{
"category": "general",
"text": "The IPv6 implementation in the Linux kernel before 6.3 has a net/ipv6/route.c max_size threshold that can be consumed easily, e.g., leading to a denial of service (network is unreachable errors) when IPv6 packets are sent in a loop via a raw socket.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52340",
"url": "https://www.suse.com/security/cve/CVE-2023-52340"
},
{
"category": "external",
"summary": "SUSE Bug 1219295 for CVE-2023-52340",
"url": "https://bugzilla.suse.com/1219295"
},
{
"category": "external",
"summary": "SUSE Bug 1219296 for CVE-2023-52340",
"url": "https://bugzilla.suse.com/1219296"
},
{
"category": "external",
"summary": "SUSE Bug 1224298 for CVE-2023-52340",
"url": "https://bugzilla.suse.com/1224298"
},
{
"category": "external",
"summary": "SUSE Bug 1224878 for CVE-2023-52340",
"url": "https://bugzilla.suse.com/1224878"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-15T12:19:06Z",
"details": "important"
}
],
"title": "CVE-2023-52340"
},
{
"cve": "CVE-2023-52429",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52429"
}
],
"notes": [
{
"category": "general",
"text": "dm_table_create in drivers/md/dm-table.c in the Linux kernel through 6.7.4 can attempt to (in alloc_targets) allocate more than INT_MAX bytes, and crash, because of a missing check for struct dm_ioctl.target_count.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52429",
"url": "https://www.suse.com/security/cve/CVE-2023-52429"
},
{
"category": "external",
"summary": "SUSE Bug 1219827 for CVE-2023-52429",
"url": "https://bugzilla.suse.com/1219827"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-15T12:19:06Z",
"details": "moderate"
}
],
"title": "CVE-2023-52429"
},
{
"cve": "CVE-2023-52439",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52439"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nuio: Fix use-after-free in uio_open\n\ncore-1\t\t\t\tcore-2\n-------------------------------------------------------\nuio_unregister_device\t\tuio_open\n\t\t\t\tidev = idr_find()\ndevice_unregister(\u0026idev-\u003edev)\nput_device(\u0026idev-\u003edev)\nuio_device_release\n\t\t\t\tget_device(\u0026idev-\u003edev)\nkfree(idev)\nuio_free_minor(minor)\n\t\t\t\tuio_release\n\t\t\t\tput_device(\u0026idev-\u003edev)\n\t\t\t\tkfree(idev)\n-------------------------------------------------------\n\nIn the core-1 uio_unregister_device(), the device_unregister will kfree\nidev when the idev-\u003edev kobject ref is 1. But after core-1\ndevice_unregister, put_device and before doing kfree, the core-2 may\nget_device. Then:\n1. After core-1 kfree idev, the core-2 will do use-after-free for idev.\n2. When core-2 do uio_release and put_device, the idev will be double\n freed.\n\nTo address this issue, we can get idev atomic \u0026 inc idev reference with\nminor_lock.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52439",
"url": "https://www.suse.com/security/cve/CVE-2023-52439"
},
{
"category": "external",
"summary": "SUSE Bug 1220140 for CVE-2023-52439",
"url": "https://bugzilla.suse.com/1220140"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-15T12:19:06Z",
"details": "moderate"
}
],
"title": "CVE-2023-52439"
},
{
"cve": "CVE-2023-52443",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52443"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\napparmor: avoid crash when parsed profile name is empty\n\nWhen processing a packed profile in unpack_profile() described like\n\n \"profile :ns::samba-dcerpcd /usr/lib*/samba/{,samba/}samba-dcerpcd {...}\"\n\na string \":samba-dcerpcd\" is unpacked as a fully-qualified name and then\npassed to aa_splitn_fqname().\n\naa_splitn_fqname() treats \":samba-dcerpcd\" as only containing a namespace.\nThus it returns NULL for tmpname, meanwhile tmpns is non-NULL. Later\naa_alloc_profile() crashes as the new profile name is NULL now.\n\ngeneral protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN NOPTI\nKASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007]\nCPU: 6 PID: 1657 Comm: apparmor_parser Not tainted 6.7.0-rc2-dirty #16\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.2-3-gd478f380-rebuilt.opensuse.org 04/01/2014\nRIP: 0010:strlen+0x1e/0xa0\nCall Trace:\n \u003cTASK\u003e\n ? strlen+0x1e/0xa0\n aa_policy_init+0x1bb/0x230\n aa_alloc_profile+0xb1/0x480\n unpack_profile+0x3bc/0x4960\n aa_unpack+0x309/0x15e0\n aa_replace_profiles+0x213/0x33c0\n policy_update+0x261/0x370\n profile_replace+0x20e/0x2a0\n vfs_write+0x2af/0xe00\n ksys_write+0x126/0x250\n do_syscall_64+0x46/0xf0\n entry_SYSCALL_64_after_hwframe+0x6e/0x76\n \u003c/TASK\u003e\n---[ end trace 0000000000000000 ]---\nRIP: 0010:strlen+0x1e/0xa0\n\nIt seems such behaviour of aa_splitn_fqname() is expected and checked in\nother places where it is called (e.g. aa_remove_profiles). Well, there\nis an explicit comment \"a ns name without a following profile is allowed\"\ninside.\n\nAFAICS, nothing can prevent unpacked \"name\" to be in form like\n\":samba-dcerpcd\" - it is passed from userspace.\n\nDeny the whole profile set replacement in such case and inform user with\nEPROTO and an explaining message.\n\nFound by Linux Verification Center (linuxtesting.org).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52443",
"url": "https://www.suse.com/security/cve/CVE-2023-52443"
},
{
"category": "external",
"summary": "SUSE Bug 1220240 for CVE-2023-52443",
"url": "https://bugzilla.suse.com/1220240"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-15T12:19:06Z",
"details": "moderate"
}
],
"title": "CVE-2023-52443"
},
{
"cve": "CVE-2023-52445",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52445"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: pvrusb2: fix use after free on context disconnection\n\nUpon module load, a kthread is created targeting the\npvr2_context_thread_func function, which may call pvr2_context_destroy\nand thus call kfree() on the context object. However, that might happen\nbefore the usb hub_event handler is able to notify the driver. This\npatch adds a sanity check before the invalid read reported by syzbot,\nwithin the context disconnection call stack.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52445",
"url": "https://www.suse.com/security/cve/CVE-2023-52445"
},
{
"category": "external",
"summary": "SUSE Bug 1220241 for CVE-2023-52445",
"url": "https://bugzilla.suse.com/1220241"
},
{
"category": "external",
"summary": "SUSE Bug 1220315 for CVE-2023-52445",
"url": "https://bugzilla.suse.com/1220315"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-15T12:19:06Z",
"details": "moderate"
}
],
"title": "CVE-2023-52445"
},
{
"cve": "CVE-2023-52447",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52447"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Defer the free of inner map when necessary\n\nWhen updating or deleting an inner map in map array or map htab, the map\nmay still be accessed by non-sleepable program or sleepable program.\nHowever bpf_map_fd_put_ptr() decreases the ref-counter of the inner map\ndirectly through bpf_map_put(), if the ref-counter is the last one\n(which is true for most cases), the inner map will be freed by\nops-\u003emap_free() in a kworker. But for now, most .map_free() callbacks\ndon\u0027t use synchronize_rcu() or its variants to wait for the elapse of a\nRCU grace period, so after the invocation of ops-\u003emap_free completes,\nthe bpf program which is accessing the inner map may incur\nuse-after-free problem.\n\nFix the free of inner map by invoking bpf_map_free_deferred() after both\none RCU grace period and one tasks trace RCU grace period if the inner\nmap has been removed from the outer map before. The deferment is\naccomplished by using call_rcu() or call_rcu_tasks_trace() when\nreleasing the last ref-counter of bpf map. The newly-added rcu_head\nfield in bpf_map shares the same storage space with work field to\nreduce the size of bpf_map.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52447",
"url": "https://www.suse.com/security/cve/CVE-2023-52447"
},
{
"category": "external",
"summary": "SUSE Bug 1220251 for CVE-2023-52447",
"url": "https://bugzilla.suse.com/1220251"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-15T12:19:06Z",
"details": "moderate"
}
],
"title": "CVE-2023-52447"
},
{
"cve": "CVE-2023-52448",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52448"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ngfs2: Fix kernel NULL pointer dereference in gfs2_rgrp_dump\n\nSyzkaller has reported a NULL pointer dereference when accessing\nrgd-\u003erd_rgl in gfs2_rgrp_dump(). This can happen when creating\nrgd-\u003erd_gl fails in read_rindex_entry(). Add a NULL pointer check in\ngfs2_rgrp_dump() to prevent that.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52448",
"url": "https://www.suse.com/security/cve/CVE-2023-52448"
},
{
"category": "external",
"summary": "SUSE Bug 1220253 for CVE-2023-52448",
"url": "https://bugzilla.suse.com/1220253"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-15T12:19:06Z",
"details": "moderate"
}
],
"title": "CVE-2023-52448"
},
{
"cve": "CVE-2023-52449",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52449"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmtd: Fix gluebi NULL pointer dereference caused by ftl notifier\n\nIf both ftl.ko and gluebi.ko are loaded, the notifier of ftl\ntriggers NULL pointer dereference when trying to access\n\u0027gluebi-\u003edesc\u0027 in gluebi_read().\n\nubi_gluebi_init\n ubi_register_volume_notifier\n ubi_enumerate_volumes\n ubi_notify_all\n gluebi_notify nb-\u003enotifier_call()\n gluebi_create\n mtd_device_register\n mtd_device_parse_register\n add_mtd_device\n blktrans_notify_add not-\u003eadd()\n ftl_add_mtd tr-\u003eadd_mtd()\n scan_header\n mtd_read\n mtd_read_oob\n mtd_read_oob_std\n gluebi_read mtd-\u003eread()\n gluebi-\u003edesc - NULL\n\nDetailed reproduction information available at the Link [1],\n\nIn the normal case, obtain gluebi-\u003edesc in the gluebi_get_device(),\nand access gluebi-\u003edesc in the gluebi_read(). However,\ngluebi_get_device() is not executed in advance in the\nftl_add_mtd() process, which leads to NULL pointer dereference.\n\nThe solution for the gluebi module is to run jffs2 on the UBI\nvolume without considering working with ftl or mtdblock [2].\nTherefore, this problem can be avoided by preventing gluebi from\ncreating the mtdblock device after creating mtd partition of the\ntype MTD_UBIVOLUME.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52449",
"url": "https://www.suse.com/security/cve/CVE-2023-52449"
},
{
"category": "external",
"summary": "SUSE Bug 1220238 for CVE-2023-52449",
"url": "https://bugzilla.suse.com/1220238"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-15T12:19:06Z",
"details": "moderate"
}
],
"title": "CVE-2023-52449"
},
{
"cve": "CVE-2023-52451",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52451"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/pseries/memhp: Fix access beyond end of drmem array\n\ndlpar_memory_remove_by_index() may access beyond the bounds of the\ndrmem lmb array when the LMB lookup fails to match an entry with the\ngiven DRC index. When the search fails, the cursor is left pointing to\n\u0026drmem_info-\u003elmbs[drmem_info-\u003en_lmbs], which is one element past the\nlast valid entry in the array. The debug message at the end of the\nfunction then dereferences this pointer:\n\n pr_debug(\"Failed to hot-remove memory at %llx\\n\",\n lmb-\u003ebase_addr);\n\nThis was found by inspection and confirmed with KASAN:\n\n pseries-hotplug-mem: Attempting to hot-remove LMB, drc index 1234\n ==================================================================\n BUG: KASAN: slab-out-of-bounds in dlpar_memory+0x298/0x1658\n Read of size 8 at addr c000000364e97fd0 by task bash/949\n\n dump_stack_lvl+0xa4/0xfc (unreliable)\n print_report+0x214/0x63c\n kasan_report+0x140/0x2e0\n __asan_load8+0xa8/0xe0\n dlpar_memory+0x298/0x1658\n handle_dlpar_errorlog+0x130/0x1d0\n dlpar_store+0x18c/0x3e0\n kobj_attr_store+0x68/0xa0\n sysfs_kf_write+0xc4/0x110\n kernfs_fop_write_iter+0x26c/0x390\n vfs_write+0x2d4/0x4e0\n ksys_write+0xac/0x1a0\n system_call_exception+0x268/0x530\n system_call_vectored_common+0x15c/0x2ec\n\n Allocated by task 1:\n kasan_save_stack+0x48/0x80\n kasan_set_track+0x34/0x50\n kasan_save_alloc_info+0x34/0x50\n __kasan_kmalloc+0xd0/0x120\n __kmalloc+0x8c/0x320\n kmalloc_array.constprop.0+0x48/0x5c\n drmem_init+0x2a0/0x41c\n do_one_initcall+0xe0/0x5c0\n kernel_init_freeable+0x4ec/0x5a0\n kernel_init+0x30/0x1e0\n ret_from_kernel_user_thread+0x14/0x1c\n\n The buggy address belongs to the object at c000000364e80000\n which belongs to the cache kmalloc-128k of size 131072\n The buggy address is located 0 bytes to the right of\n allocated 98256-byte region [c000000364e80000, c000000364e97fd0)\n\n ==================================================================\n pseries-hotplug-mem: Failed to hot-remove memory at 0\n\nLog failed lookups with a separate message and dereference the\ncursor only when it points to a valid entry.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52451",
"url": "https://www.suse.com/security/cve/CVE-2023-52451"
},
{
"category": "external",
"summary": "SUSE Bug 1220250 for CVE-2023-52451",
"url": "https://bugzilla.suse.com/1220250"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-15T12:19:06Z",
"details": "moderate"
}
],
"title": "CVE-2023-52451"
},
{
"cve": "CVE-2023-52452",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52452"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Fix accesses to uninit stack slots\n\nPrivileged programs are supposed to be able to read uninitialized stack\nmemory (ever since 6715df8d5) but, before this patch, these accesses\nwere permitted inconsistently. In particular, accesses were permitted\nabove state-\u003eallocated_stack, but not below it. In other words, if the\nstack was already \"large enough\", the access was permitted, but\notherwise the access was rejected instead of being allowed to \"grow the\nstack\". This undesired rejection was happening in two places:\n- in check_stack_slot_within_bounds()\n- in check_stack_range_initialized()\nThis patch arranges for these accesses to be permitted. A bunch of tests\nthat were relying on the old rejection had to change; all of them were\nchanged to add also run unprivileged, in which case the old behavior\npersists. One tests couldn\u0027t be updated - global_func16 - because it\ncan\u0027t run unprivileged for other reasons.\n\nThis patch also fixes the tracking of the stack size for variable-offset\nreads. This second fix is bundled in the same commit as the first one\nbecause they\u0027re inter-related. Before this patch, writes to the stack\nusing registers containing a variable offset (as opposed to registers\nwith fixed, known values) were not properly contributing to the\nfunction\u0027s needed stack size. As a result, it was possible for a program\nto verify, but then to attempt to read out-of-bounds data at runtime\nbecause a too small stack had been allocated for it.\n\nEach function tracks the size of the stack it needs in\nbpf_subprog_info.stack_depth, which is maintained by\nupdate_stack_depth(). For regular memory accesses, check_mem_access()\nwas calling update_state_depth() but it was passing in only the fixed\npart of the offset register, ignoring the variable offset. This was\nincorrect; the minimum possible value of that register should be used\ninstead.\n\nThis tracking is now fixed by centralizing the tracking of stack size in\ngrow_stack_state(), and by lifting the calls to grow_stack_state() to\ncheck_stack_access_within_bounds() as suggested by Andrii. The code is\nnow simpler and more convincingly tracks the correct maximum stack size.\ncheck_stack_range_initialized() can now rely on enough stack having been\nallocated for the access; this helps with the fix for the first issue.\n\nA few tests were changed to also check the stack depth computation. The\none that fails without this patch is verifier_var_off:stack_write_priv_vs_unpriv.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52452",
"url": "https://www.suse.com/security/cve/CVE-2023-52452"
},
{
"category": "external",
"summary": "SUSE Bug 1220257 for CVE-2023-52452",
"url": "https://bugzilla.suse.com/1220257"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-15T12:19:06Z",
"details": "moderate"
}
],
"title": "CVE-2023-52452"
},
{
"cve": "CVE-2023-52456",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52456"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nserial: imx: fix tx statemachine deadlock\n\nWhen using the serial port as RS485 port, the tx statemachine is used to\ncontrol the RTS pin to drive the RS485 transceiver TX_EN pin. When the\nTTY port is closed in the middle of a transmission (for instance during\nuserland application crash), imx_uart_shutdown disables the interface\nand disables the Transmission Complete interrupt. afer that,\nimx_uart_stop_tx bails on an incomplete transmission, to be retriggered\nby the TC interrupt. This interrupt is disabled and therefore the tx\nstatemachine never transitions out of SEND. The statemachine is in\ndeadlock now, and the TX_EN remains low, making the interface useless.\n\nimx_uart_stop_tx now checks for incomplete transmission AND whether TC\ninterrupts are enabled before bailing to be retriggered. This makes sure\nthe state machine handling is reached, and is properly set to\nWAIT_AFTER_SEND.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52456",
"url": "https://www.suse.com/security/cve/CVE-2023-52456"
},
{
"category": "external",
"summary": "SUSE Bug 1220364 for CVE-2023-52456",
"url": "https://bugzilla.suse.com/1220364"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-15T12:19:06Z",
"details": "moderate"
}
],
"title": "CVE-2023-52456"
},
{
"cve": "CVE-2023-52457",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52457"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nserial: 8250: omap: Don\u0027t skip resource freeing if pm_runtime_resume_and_get() failed\n\nReturning an error code from .remove() makes the driver core emit the\nlittle helpful error message:\n\n\tremove callback returned a non-zero value. This will be ignored.\n\nand then remove the device anyhow. So all resources that were not freed\nare leaked in this case. Skipping serial8250_unregister_port() has the\npotential to keep enough of the UART around to trigger a use-after-free.\n\nSo replace the error return (and with it the little helpful error\nmessage) by a more useful error message and continue to cleanup.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52457",
"url": "https://www.suse.com/security/cve/CVE-2023-52457"
},
{
"category": "external",
"summary": "SUSE Bug 1220350 for CVE-2023-52457",
"url": "https://bugzilla.suse.com/1220350"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-15T12:19:06Z",
"details": "moderate"
}
],
"title": "CVE-2023-52457"
},
{
"cve": "CVE-2023-52463",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52463"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nefivarfs: force RO when remounting if SetVariable is not supported\n\nIf SetVariable at runtime is not supported by the firmware we never assign\na callback for that function. At the same time mount the efivarfs as\nRO so no one can call that. However, we never check the permission flags\nwhen someone remounts the filesystem as RW. As a result this leads to a\ncrash looking like this:\n\n$ mount -o remount,rw /sys/firmware/efi/efivars\n$ efi-updatevar -f PK.auth PK\n\n[ 303.279166] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000000\n[ 303.280482] Mem abort info:\n[ 303.280854] ESR = 0x0000000086000004\n[ 303.281338] EC = 0x21: IABT (current EL), IL = 32 bits\n[ 303.282016] SET = 0, FnV = 0\n[ 303.282414] EA = 0, S1PTW = 0\n[ 303.282821] FSC = 0x04: level 0 translation fault\n[ 303.283771] user pgtable: 4k pages, 48-bit VAs, pgdp=000000004258c000\n[ 303.284913] [0000000000000000] pgd=0000000000000000, p4d=0000000000000000\n[ 303.286076] Internal error: Oops: 0000000086000004 [#1] PREEMPT SMP\n[ 303.286936] Modules linked in: qrtr tpm_tis tpm_tis_core crct10dif_ce arm_smccc_trng rng_core drm fuse ip_tables x_tables ipv6\n[ 303.288586] CPU: 1 PID: 755 Comm: efi-updatevar Not tainted 6.3.0-rc1-00108-gc7d0c4695c68 #1\n[ 303.289748] Hardware name: Unknown Unknown Product/Unknown Product, BIOS 2023.04-00627-g88336918701d 04/01/2023\n[ 303.291150] pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n[ 303.292123] pc : 0x0\n[ 303.292443] lr : efivar_set_variable_locked+0x74/0xec\n[ 303.293156] sp : ffff800008673c10\n[ 303.293619] x29: ffff800008673c10 x28: ffff0000037e8000 x27: 0000000000000000\n[ 303.294592] x26: 0000000000000800 x25: ffff000002467400 x24: 0000000000000027\n[ 303.295572] x23: ffffd49ea9832000 x22: ffff0000020c9800 x21: ffff000002467000\n[ 303.296566] x20: 0000000000000001 x19: 00000000000007fc x18: 0000000000000000\n[ 303.297531] x17: 0000000000000000 x16: 0000000000000000 x15: 0000aaaac807ab54\n[ 303.298495] x14: ed37489f673633c0 x13: 71c45c606de13f80 x12: 47464259e219acf4\n[ 303.299453] x11: ffff000002af7b01 x10: 0000000000000003 x9 : 0000000000000002\n[ 303.300431] x8 : 0000000000000010 x7 : ffffd49ea8973230 x6 : 0000000000a85201\n[ 303.301412] x5 : 0000000000000000 x4 : ffff0000020c9800 x3 : 00000000000007fc\n[ 303.302370] x2 : 0000000000000027 x1 : ffff000002467400 x0 : ffff000002467000\n[ 303.303341] Call trace:\n[ 303.303679] 0x0\n[ 303.303938] efivar_entry_set_get_size+0x98/0x16c\n[ 303.304585] efivarfs_file_write+0xd0/0x1a4\n[ 303.305148] vfs_write+0xc4/0x2e4\n[ 303.305601] ksys_write+0x70/0x104\n[ 303.306073] __arm64_sys_write+0x1c/0x28\n[ 303.306622] invoke_syscall+0x48/0x114\n[ 303.307156] el0_svc_common.constprop.0+0x44/0xec\n[ 303.307803] do_el0_svc+0x38/0x98\n[ 303.308268] el0_svc+0x2c/0x84\n[ 303.308702] el0t_64_sync_handler+0xf4/0x120\n[ 303.309293] el0t_64_sync+0x190/0x194\n[ 303.309794] Code: ???????? ???????? ???????? ???????? (????????)\n[ 303.310612] ---[ end trace 0000000000000000 ]---\n\nFix this by adding a .reconfigure() function to the fs operations which\nwe can use to check the requested flags and deny anything that\u0027s not RO\nif the firmware doesn\u0027t implement SetVariable at runtime.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52463",
"url": "https://www.suse.com/security/cve/CVE-2023-52463"
},
{
"category": "external",
"summary": "SUSE Bug 1220328 for CVE-2023-52463",
"url": "https://bugzilla.suse.com/1220328"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-15T12:19:06Z",
"details": "moderate"
}
],
"title": "CVE-2023-52463"
},
{
"cve": "CVE-2023-52464",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52464"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nEDAC/thunderx: Fix possible out-of-bounds string access\n\nEnabling -Wstringop-overflow globally exposes a warning for a common bug\nin the usage of strncat():\n\n drivers/edac/thunderx_edac.c: In function \u0027thunderx_ocx_com_threaded_isr\u0027:\n drivers/edac/thunderx_edac.c:1136:17: error: \u0027strncat\u0027 specified bound 1024 equals destination size [-Werror=stringop-overflow=]\n 1136 | strncat(msg, other, OCX_MESSAGE_SIZE);\n | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~\n ...\n 1145 | strncat(msg, other, OCX_MESSAGE_SIZE);\n ...\n 1150 | strncat(msg, other, OCX_MESSAGE_SIZE);\n\n ...\n\nApparently the author of this driver expected strncat() to behave the\nway that strlcat() does, which uses the size of the destination buffer\nas its third argument rather than the length of the source buffer. The\nresult is that there is no check on the size of the allocated buffer.\n\nChange it to strlcat().\n\n [ bp: Trim compiler output, fixup commit message. ]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52464",
"url": "https://www.suse.com/security/cve/CVE-2023-52464"
},
{
"category": "external",
"summary": "SUSE Bug 1220330 for CVE-2023-52464",
"url": "https://bugzilla.suse.com/1220330"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-15T12:19:06Z",
"details": "moderate"
}
],
"title": "CVE-2023-52464"
},
{
"cve": "CVE-2023-52467",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52467"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmfd: syscon: Fix null pointer dereference in of_syscon_register()\n\nkasprintf() returns a pointer to dynamically allocated memory\nwhich can be NULL upon failure.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52467",
"url": "https://www.suse.com/security/cve/CVE-2023-52467"
},
{
"category": "external",
"summary": "SUSE Bug 1220433 for CVE-2023-52467",
"url": "https://bugzilla.suse.com/1220433"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-15T12:19:06Z",
"details": "moderate"
}
],
"title": "CVE-2023-52467"
},
{
"cve": "CVE-2023-52475",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52475"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nInput: powermate - fix use-after-free in powermate_config_complete\n\nsyzbot has found a use-after-free bug [1] in the powermate driver. This\nhappens when the device is disconnected, which leads to a memory free from\nthe powermate_device struct. When an asynchronous control message\ncompletes after the kfree and its callback is invoked, the lock does not\nexist anymore and hence the bug.\n\nUse usb_kill_urb() on pm-\u003econfig to cancel any in-progress requests upon\ndevice disconnection.\n\n[1] https://syzkaller.appspot.com/bug?extid=0434ac83f907a1dbdd1e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52475",
"url": "https://www.suse.com/security/cve/CVE-2023-52475"
},
{
"category": "external",
"summary": "SUSE Bug 1220649 for CVE-2023-52475",
"url": "https://bugzilla.suse.com/1220649"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-15T12:19:06Z",
"details": "moderate"
}
],
"title": "CVE-2023-52475"
},
{
"cve": "CVE-2023-52478",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52478"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: logitech-hidpp: Fix kernel crash on receiver USB disconnect\n\nhidpp_connect_event() has *four* time-of-check vs time-of-use (TOCTOU)\nraces when it races with itself.\n\nhidpp_connect_event() primarily runs from a workqueue but it also runs\non probe() and if a \"device-connected\" packet is received by the hw\nwhen the thread running hidpp_connect_event() from probe() is waiting on\nthe hw, then a second thread running hidpp_connect_event() will be\nstarted from the workqueue.\n\nThis opens the following races (note the below code is simplified):\n\n1. Retrieving + printing the protocol (harmless race):\n\n\tif (!hidpp-\u003eprotocol_major) {\n\t\thidpp_root_get_protocol_version()\n\t\thidpp-\u003eprotocol_major = response.rap.params[0];\n\t}\n\nWe can actually see this race hit in the dmesg in the abrt output\nattached to rhbz#2227968:\n\n[ 3064.624215] logitech-hidpp-device 0003:046D:4071.0049: HID++ 4.5 device connected.\n[ 3064.658184] logitech-hidpp-device 0003:046D:4071.0049: HID++ 4.5 device connected.\n\nTesting with extra logging added has shown that after this the 2 threads\ntake turn grabbing the hw access mutex (send_mutex) so they ping-pong\nthrough all the other TOCTOU cases managing to hit all of them:\n\n2. Updating the name to the HIDPP name (harmless race):\n\n\tif (hidpp-\u003ename == hdev-\u003ename) {\n\t\t...\n\t\thidpp-\u003ename = new_name;\n\t}\n\n3. Initializing the power_supply class for the battery (problematic!):\n\nhidpp_initialize_battery()\n{\n if (hidpp-\u003ebattery.ps)\n return 0;\n\n\tprobe_battery(); /* Blocks, threads take turns executing this */\n\n\thidpp-\u003ebattery.desc.properties =\n\t\tdevm_kmemdup(dev, hidpp_battery_props, cnt, GFP_KERNEL);\n\n\thidpp-\u003ebattery.ps =\n\t\tdevm_power_supply_register(\u0026hidpp-\u003ehid_dev-\u003edev,\n\t\t\t\t\t \u0026hidpp-\u003ebattery.desc, cfg);\n}\n\n4. Creating delayed input_device (potentially problematic):\n\n\tif (hidpp-\u003edelayed_input)\n\t\treturn;\n\n\thidpp-\u003edelayed_input = hidpp_allocate_input(hdev);\n\nThe really big problem here is 3. Hitting the race leads to the following\nsequence:\n\n\thidpp-\u003ebattery.desc.properties =\n\t\tdevm_kmemdup(dev, hidpp_battery_props, cnt, GFP_KERNEL);\n\n\thidpp-\u003ebattery.ps =\n\t\tdevm_power_supply_register(\u0026hidpp-\u003ehid_dev-\u003edev,\n\t\t\t\t\t \u0026hidpp-\u003ebattery.desc, cfg);\n\n\t...\n\n\thidpp-\u003ebattery.desc.properties =\n\t\tdevm_kmemdup(dev, hidpp_battery_props, cnt, GFP_KERNEL);\n\n\thidpp-\u003ebattery.ps =\n\t\tdevm_power_supply_register(\u0026hidpp-\u003ehid_dev-\u003edev,\n\t\t\t\t\t \u0026hidpp-\u003ebattery.desc, cfg);\n\nSo now we have registered 2 power supplies for the same battery,\nwhich looks a bit weird from userspace\u0027s pov but this is not even\nthe really big problem.\n\nNotice how:\n\n1. This is all devm-maganaged\n2. The hidpp-\u003ebattery.desc struct is shared between the 2 power supplies\n3. hidpp-\u003ebattery.desc.properties points to the result from the second\n devm_kmemdup()\n\nThis causes a use after free scenario on USB disconnect of the receiver:\n1. The last registered power supply class device gets unregistered\n2. The memory from the last devm_kmemdup() call gets freed,\n hidpp-\u003ebattery.desc.properties now points to freed memory\n3. The first registered power supply class device gets unregistered,\n this involves sending a remove uevent to userspace which invokes\n power_supply_uevent() to fill the uevent data\n4. power_supply_uevent() uses hidpp-\u003ebattery.desc.properties which\n now points to freed memory leading to backtraces like this one:\n\nSep 22 20:01:35 eric kernel: BUG: unable to handle page fault for address: ffffb2140e017f08\n...\nSep 22 20:01:35 eric kernel: Workqueue: usb_hub_wq hub_event\nSep 22 20:01:35 eric kernel: RIP: 0010:power_supply_uevent+0xee/0x1d0\n...\nSep 22 20:01:35 eric kernel: ? asm_exc_page_fault+0x26/0x30\nSep 22 20:01:35 eric kernel: ? power_supply_uevent+0xee/0x1d0\nSep 22 20:01:35 eric kernel: ? power_supply_uevent+0x10d/0x1d0\nSep 22 20:01:35 eric kernel: dev_uevent+0x10f/0x2d0\nSep 22 20:01:35 eric kernel: kobject_uevent_env+0x291/0x680\nSep 22 20:01:35 eric kernel: \n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52478",
"url": "https://www.suse.com/security/cve/CVE-2023-52478"
},
{
"category": "external",
"summary": "SUSE Bug 1220796 for CVE-2023-52478",
"url": "https://bugzilla.suse.com/1220796"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-15T12:19:06Z",
"details": "moderate"
}
],
"title": "CVE-2023-52478"
},
{
"cve": "CVE-2023-52482",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52482"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86/srso: Add SRSO mitigation for Hygon processors\n\nAdd mitigation for the speculative return stack overflow vulnerability\nwhich exists on Hygon processors too.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52482",
"url": "https://www.suse.com/security/cve/CVE-2023-52482"
},
{
"category": "external",
"summary": "SUSE Bug 1220735 for CVE-2023-52482",
"url": "https://bugzilla.suse.com/1220735"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-15T12:19:06Z",
"details": "moderate"
}
],
"title": "CVE-2023-52482"
},
{
"cve": "CVE-2023-52484",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52484"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\niommu/arm-smmu-v3: Fix soft lockup triggered by arm_smmu_mm_invalidate_range\n\nWhen running an SVA case, the following soft lockup is triggered:\n--------------------------------------------------------------------\nwatchdog: BUG: soft lockup - CPU#244 stuck for 26s!\npstate: 83400009 (Nzcv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--)\npc : arm_smmu_cmdq_issue_cmdlist+0x178/0xa50\nlr : arm_smmu_cmdq_issue_cmdlist+0x150/0xa50\nsp : ffff8000d83ef290\nx29: ffff8000d83ef290 x28: 000000003b9aca00 x27: 0000000000000000\nx26: ffff8000d83ef3c0 x25: da86c0812194a0e8 x24: 0000000000000000\nx23: 0000000000000040 x22: ffff8000d83ef340 x21: ffff0000c63980c0\nx20: 0000000000000001 x19: ffff0000c6398080 x18: 0000000000000000\nx17: 0000000000000000 x16: 0000000000000000 x15: ffff3000b4a3bbb0\nx14: ffff3000b4a30888 x13: ffff3000b4a3cf60 x12: 0000000000000000\nx11: 0000000000000000 x10: 0000000000000000 x9 : ffffc08120e4d6bc\nx8 : 0000000000000000 x7 : 0000000000000000 x6 : 0000000000048cfa\nx5 : 0000000000000000 x4 : 0000000000000001 x3 : 000000000000000a\nx2 : 0000000080000000 x1 : 0000000000000000 x0 : 0000000000000001\nCall trace:\n arm_smmu_cmdq_issue_cmdlist+0x178/0xa50\n __arm_smmu_tlb_inv_range+0x118/0x254\n arm_smmu_tlb_inv_range_asid+0x6c/0x130\n arm_smmu_mm_invalidate_range+0xa0/0xa4\n __mmu_notifier_invalidate_range_end+0x88/0x120\n unmap_vmas+0x194/0x1e0\n unmap_region+0xb4/0x144\n do_mas_align_munmap+0x290/0x490\n do_mas_munmap+0xbc/0x124\n __vm_munmap+0xa8/0x19c\n __arm64_sys_munmap+0x28/0x50\n invoke_syscall+0x78/0x11c\n el0_svc_common.constprop.0+0x58/0x1c0\n do_el0_svc+0x34/0x60\n el0_svc+0x2c/0xd4\n el0t_64_sync_handler+0x114/0x140\n el0t_64_sync+0x1a4/0x1a8\n--------------------------------------------------------------------\n\nNote that since 6.6-rc1 the arm_smmu_mm_invalidate_range above is renamed\nto \"arm_smmu_mm_arch_invalidate_secondary_tlbs\", yet the problem remains.\n\nThe commit 06ff87bae8d3 (\"arm64: mm: remove unused functions and variable\nprotoypes\") fixed a similar lockup on the CPU MMU side. Yet, it can occur\nto SMMU too, since arm_smmu_mm_arch_invalidate_secondary_tlbs() is called\ntypically next to MMU tlb flush function, e.g.\n\ttlb_flush_mmu_tlbonly {\n\t\ttlb_flush {\n\t\t\t__flush_tlb_range {\n\t\t\t\t// check MAX_TLBI_OPS\n\t\t\t}\n\t\t}\n\t\tmmu_notifier_arch_invalidate_secondary_tlbs {\n\t\t\tarm_smmu_mm_arch_invalidate_secondary_tlbs {\n\t\t\t\t// does not check MAX_TLBI_OPS\n\t\t\t}\n\t\t}\n\t}\n\nClone a CMDQ_MAX_TLBI_OPS from the MAX_TLBI_OPS in tlbflush.h, since in an\nSVA case SMMU uses the CPU page table, so it makes sense to align with the\ntlbflush code. Then, replace per-page TLBI commands with a single per-asid\nTLBI command, if the request size hits this threshold.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52484",
"url": "https://www.suse.com/security/cve/CVE-2023-52484"
},
{
"category": "external",
"summary": "SUSE Bug 1220797 for CVE-2023-52484",
"url": "https://bugzilla.suse.com/1220797"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-15T12:19:06Z",
"details": "moderate"
}
],
"title": "CVE-2023-52484"
},
{
"cve": "CVE-2023-52530",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52530"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mac80211: fix potential key use-after-free\n\nWhen ieee80211_key_link() is called by ieee80211_gtk_rekey_add()\nbut returns 0 due to KRACK protection (identical key reinstall),\nieee80211_gtk_rekey_add() will still return a pointer into the\nkey, in a potential use-after-free. This normally doesn\u0027t happen\nsince it\u0027s only called by iwlwifi in case of WoWLAN rekey offload\nwhich has its own KRACK protection, but still better to fix, do\nthat by returning an error code and converting that to success on\nthe cfg80211 boundary only, leaving the error for bad callers of\nieee80211_gtk_rekey_add().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52530",
"url": "https://www.suse.com/security/cve/CVE-2023-52530"
},
{
"category": "external",
"summary": "SUSE Bug 1220930 for CVE-2023-52530",
"url": "https://bugzilla.suse.com/1220930"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-15T12:19:06Z",
"details": "moderate"
}
],
"title": "CVE-2023-52530"
},
{
"cve": "CVE-2023-52531",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52531"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: iwlwifi: mvm: Fix a memory corruption issue\n\nA few lines above, space is kzalloc()\u0027ed for:\n\tsizeof(struct iwl_nvm_data) +\n\tsizeof(struct ieee80211_channel) +\n\tsizeof(struct ieee80211_rate)\n\n\u0027mvm-\u003envm_data\u0027 is a \u0027struct iwl_nvm_data\u0027, so it is fine.\n\nAt the end of this structure, there is the \u0027channels\u0027 flex array.\nEach element is of type \u0027struct ieee80211_channel\u0027.\nSo only 1 element is allocated in this array.\n\nWhen doing:\n mvm-\u003envm_data-\u003ebands[0].channels = mvm-\u003envm_data-\u003echannels;\nWe point at the first element of the \u0027channels\u0027 flex array.\nSo this is fine.\n\nHowever, when doing:\n mvm-\u003envm_data-\u003ebands[0].bitrates =\n\t\t\t(void *)((u8 *)mvm-\u003envm_data-\u003echannels + 1);\nbecause of the \"(u8 *)\" cast, we add only 1 to the address of the beginning\nof the flex array.\n\nIt is likely that we want point at the \u0027struct ieee80211_rate\u0027 allocated\njust after.\n\nRemove the spurious casting so that the pointer arithmetic works as\nexpected.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52531",
"url": "https://www.suse.com/security/cve/CVE-2023-52531"
},
{
"category": "external",
"summary": "SUSE Bug 1220931 for CVE-2023-52531",
"url": "https://bugzilla.suse.com/1220931"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-15T12:19:06Z",
"details": "moderate"
}
],
"title": "CVE-2023-52531"
},
{
"cve": "CVE-2023-52559",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52559"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\niommu/vt-d: Avoid memory allocation in iommu_suspend()\n\nThe iommu_suspend() syscore suspend callback is invoked with IRQ disabled.\nAllocating memory with the GFP_KERNEL flag may re-enable IRQs during\nthe suspend callback, which can cause intermittent suspend/hibernation\nproblems with the following kernel traces:\n\nCalling iommu_suspend+0x0/0x1d0\n------------[ cut here ]------------\nWARNING: CPU: 0 PID: 15 at kernel/time/timekeeping.c:868 ktime_get+0x9b/0xb0\n...\nCPU: 0 PID: 15 Comm: rcu_preempt Tainted: G U E 6.3-intel #r1\nRIP: 0010:ktime_get+0x9b/0xb0\n...\nCall Trace:\n \u003cIRQ\u003e\n tick_sched_timer+0x22/0x90\n ? __pfx_tick_sched_timer+0x10/0x10\n __hrtimer_run_queues+0x111/0x2b0\n hrtimer_interrupt+0xfa/0x230\n __sysvec_apic_timer_interrupt+0x63/0x140\n sysvec_apic_timer_interrupt+0x7b/0xa0\n \u003c/IRQ\u003e\n \u003cTASK\u003e\n asm_sysvec_apic_timer_interrupt+0x1f/0x30\n...\n------------[ cut here ]------------\nInterrupts enabled after iommu_suspend+0x0/0x1d0\nWARNING: CPU: 0 PID: 27420 at drivers/base/syscore.c:68 syscore_suspend+0x147/0x270\nCPU: 0 PID: 27420 Comm: rtcwake Tainted: G U W E 6.3-intel #r1\nRIP: 0010:syscore_suspend+0x147/0x270\n...\nCall Trace:\n \u003cTASK\u003e\n hibernation_snapshot+0x25b/0x670\n hibernate+0xcd/0x390\n state_store+0xcf/0xe0\n kobj_attr_store+0x13/0x30\n sysfs_kf_write+0x3f/0x50\n kernfs_fop_write_iter+0x128/0x200\n vfs_write+0x1fd/0x3c0\n ksys_write+0x6f/0xf0\n __x64_sys_write+0x1d/0x30\n do_syscall_64+0x3b/0x90\n entry_SYSCALL_64_after_hwframe+0x72/0xdc\n\nGiven that only 4 words memory is needed, avoid the memory allocation in\niommu_suspend().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52559",
"url": "https://www.suse.com/security/cve/CVE-2023-52559"
},
{
"category": "external",
"summary": "SUSE Bug 1220933 for CVE-2023-52559",
"url": "https://bugzilla.suse.com/1220933"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-15T12:19:06Z",
"details": "moderate"
}
],
"title": "CVE-2023-52559"
},
{
"cve": "CVE-2023-6270",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-6270"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the ATA over Ethernet (AoE) driver in the Linux kernel. The aoecmd_cfg_pkts() function improperly updates the refcnt on `struct net_device`, and a use-after-free can be triggered by racing between the free on the struct and the access through the `skbtxq` global queue. This could lead to a denial of service condition or potential code execution.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-6270",
"url": "https://www.suse.com/security/cve/CVE-2023-6270"
},
{
"category": "external",
"summary": "SUSE Bug 1218562 for CVE-2023-6270",
"url": "https://bugzilla.suse.com/1218562"
},
{
"category": "external",
"summary": "SUSE Bug 1218813 for CVE-2023-6270",
"url": "https://bugzilla.suse.com/1218813"
},
{
"category": "external",
"summary": "SUSE Bug 1221578 for CVE-2023-6270",
"url": "https://bugzilla.suse.com/1221578"
},
{
"category": "external",
"summary": "SUSE Bug 1221598 for CVE-2023-6270",
"url": "https://bugzilla.suse.com/1221598"
},
{
"category": "external",
"summary": "SUSE Bug 1223016 for CVE-2023-6270",
"url": "https://bugzilla.suse.com/1223016"
},
{
"category": "external",
"summary": "SUSE Bug 1227675 for CVE-2023-6270",
"url": "https://bugzilla.suse.com/1227675"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-15T12:19:06Z",
"details": "moderate"
}
],
"title": "CVE-2023-6270"
},
{
"cve": "CVE-2023-6817",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-6817"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free vulnerability in the Linux kernel\u0027s netfilter: nf_tables component can be exploited to achieve local privilege escalation.\n\nThe function nft_pipapo_walk did not skip inactive elements during set walk which could lead double deactivations of PIPAPO (Pile Packet Policies) elements, leading to use-after-free.\n\nWe recommend upgrading past commit 317eb9685095678f2c9f5a8189de698c5354316a.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-6817",
"url": "https://www.suse.com/security/cve/CVE-2023-6817"
},
{
"category": "external",
"summary": "SUSE Bug 1218195 for CVE-2023-6817",
"url": "https://bugzilla.suse.com/1218195"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-15T12:19:06Z",
"details": "moderate"
}
],
"title": "CVE-2023-6817"
},
{
"cve": "CVE-2024-0607",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-0607"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Netfilter subsystem in the Linux kernel. The issue is in the nft_byteorder_eval() function, where the code iterates through a loop and writes to the `dst` array. On each iteration, 8 bytes are written, but `dst` is an array of u32, so each element only has space for 4 bytes. That means every iteration overwrites part of the previous element corrupting this array of u32. This flaw allows a local user to cause a denial of service or potentially break NetFilter functionality.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-0607",
"url": "https://www.suse.com/security/cve/CVE-2024-0607"
},
{
"category": "external",
"summary": "SUSE Bug 1218915 for CVE-2024-0607",
"url": "https://bugzilla.suse.com/1218915"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L",
"version": "3.1"
},
"products": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-15T12:19:06Z",
"details": "moderate"
}
],
"title": "CVE-2024-0607"
},
{
"cve": "CVE-2024-1151",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-1151"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was reported in the Open vSwitch sub-component in the Linux Kernel. The flaw occurs when a recursive operation of code push recursively calls into the code block. The OVS module does not validate the stack depth, pushing too many frames and causing a stack overflow. As a result, this can lead to a crash or other related issues.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-1151",
"url": "https://www.suse.com/security/cve/CVE-2024-1151"
},
{
"category": "external",
"summary": "SUSE Bug 1219835 for CVE-2024-1151",
"url": "https://bugzilla.suse.com/1219835"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-15T12:19:06Z",
"details": "moderate"
}
],
"title": "CVE-2024-1151"
},
{
"cve": "CVE-2024-23849",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-23849"
}
],
"notes": [
{
"category": "general",
"text": "In rds_recv_track_latency in net/rds/af_rds.c in the Linux kernel through 6.7.1, there is an off-by-one error for an RDS_MSG_RX_DGRAM_TRACE_MAX comparison, resulting in out-of-bounds access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-23849",
"url": "https://www.suse.com/security/cve/CVE-2024-23849"
},
{
"category": "external",
"summary": "SUSE Bug 1219127 for CVE-2024-23849",
"url": "https://bugzilla.suse.com/1219127"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-15T12:19:06Z",
"details": "moderate"
}
],
"title": "CVE-2024-23849"
},
{
"cve": "CVE-2024-23850",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-23850"
}
],
"notes": [
{
"category": "general",
"text": "In btrfs_get_root_ref in fs/btrfs/disk-io.c in the Linux kernel through 6.7.1, there can be an assertion failure and crash because a subvolume can be read out too soon after its root item is inserted upon subvolume creation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-23850",
"url": "https://www.suse.com/security/cve/CVE-2024-23850"
},
{
"category": "external",
"summary": "SUSE Bug 1219126 for CVE-2024-23850",
"url": "https://bugzilla.suse.com/1219126"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-15T12:19:06Z",
"details": "moderate"
}
],
"title": "CVE-2024-23850"
},
{
"cve": "CVE-2024-23851",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-23851"
}
],
"notes": [
{
"category": "general",
"text": "copy_params in drivers/md/dm-ioctl.c in the Linux kernel through 6.7.1 can attempt to allocate more than INT_MAX bytes, and crash, because of a missing param_kernel-\u003edata_size check. This is related to ctl_ioctl.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-23851",
"url": "https://www.suse.com/security/cve/CVE-2024-23851"
},
{
"category": "external",
"summary": "SUSE Bug 1219146 for CVE-2024-23851",
"url": "https://bugzilla.suse.com/1219146"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-15T12:19:06Z",
"details": "moderate"
}
],
"title": "CVE-2024-23851"
},
{
"cve": "CVE-2024-26585",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26585"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntls: fix race between tx work scheduling and socket close\n\nSimilarly to previous commit, the submitting thread (recvmsg/sendmsg)\nmay exit as soon as the async crypto handler calls complete().\nReorder scheduling the work before calling complete().\nThis seems more logical in the first place, as it\u0027s\nthe inverse order of what the submitting thread will do.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26585",
"url": "https://www.suse.com/security/cve/CVE-2024-26585"
},
{
"category": "external",
"summary": "SUSE Bug 1220187 for CVE-2024-26585",
"url": "https://bugzilla.suse.com/1220187"
},
{
"category": "external",
"summary": "SUSE Bug 1220211 for CVE-2024-26585",
"url": "https://bugzilla.suse.com/1220211"
},
{
"category": "external",
"summary": "SUSE Bug 1224298 for CVE-2024-26585",
"url": "https://bugzilla.suse.com/1224298"
},
{
"category": "external",
"summary": "SUSE Bug 1224878 for CVE-2024-26585",
"url": "https://bugzilla.suse.com/1224878"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-15T12:19:06Z",
"details": "important"
}
],
"title": "CVE-2024-26585"
},
{
"cve": "CVE-2024-26586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26586"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmlxsw: spectrum_acl_tcam: Fix stack corruption\n\nWhen tc filters are first added to a net device, the corresponding local\nport gets bound to an ACL group in the device. The group contains a list\nof ACLs. In turn, each ACL points to a different TCAM region where the\nfilters are stored. During forwarding, the ACLs are sequentially\nevaluated until a match is found.\n\nOne reason to place filters in different regions is when they are added\nwith decreasing priorities and in an alternating order so that two\nconsecutive filters can never fit in the same region because of their\nkey usage.\n\nIn Spectrum-2 and newer ASICs the firmware started to report that the\nmaximum number of ACLs in a group is more than 16, but the layout of the\nregister that configures ACL groups (PAGT) was not updated to account\nfor that. It is therefore possible to hit stack corruption [1] in the\nrare case where more than 16 ACLs in a group are required.\n\nFix by limiting the maximum ACL group size to the minimum between what\nthe firmware reports and the maximum ACLs that fit in the PAGT register.\n\nAdd a test case to make sure the machine does not crash when this\ncondition is hit.\n\n[1]\nKernel panic - not syncing: stack-protector: Kernel stack is corrupted in: mlxsw_sp_acl_tcam_group_update+0x116/0x120\n[...]\n dump_stack_lvl+0x36/0x50\n panic+0x305/0x330\n __stack_chk_fail+0x15/0x20\n mlxsw_sp_acl_tcam_group_update+0x116/0x120\n mlxsw_sp_acl_tcam_group_region_attach+0x69/0x110\n mlxsw_sp_acl_tcam_vchunk_get+0x492/0xa20\n mlxsw_sp_acl_tcam_ventry_add+0x25/0xe0\n mlxsw_sp_acl_rule_add+0x47/0x240\n mlxsw_sp_flower_replace+0x1a9/0x1d0\n tc_setup_cb_add+0xdc/0x1c0\n fl_hw_replace_filter+0x146/0x1f0\n fl_change+0xc17/0x1360\n tc_new_tfilter+0x472/0xb90\n rtnetlink_rcv_msg+0x313/0x3b0\n netlink_rcv_skb+0x58/0x100\n netlink_unicast+0x244/0x390\n netlink_sendmsg+0x1e4/0x440\n ____sys_sendmsg+0x164/0x260\n ___sys_sendmsg+0x9a/0xe0\n __sys_sendmsg+0x7a/0xc0\n do_syscall_64+0x40/0xe0\n entry_SYSCALL_64_after_hwframe+0x63/0x6b",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26586",
"url": "https://www.suse.com/security/cve/CVE-2024-26586"
},
{
"category": "external",
"summary": "SUSE Bug 1220243 for CVE-2024-26586",
"url": "https://bugzilla.suse.com/1220243"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-15T12:19:06Z",
"details": "moderate"
}
],
"title": "CVE-2024-26586"
},
{
"cve": "CVE-2024-26589",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26589"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Reject variable offset alu on PTR_TO_FLOW_KEYS\n\nFor PTR_TO_FLOW_KEYS, check_flow_keys_access() only uses fixed off\nfor validation. However, variable offset ptr alu is not prohibited\nfor this ptr kind. So the variable offset is not checked.\n\nThe following prog is accepted:\n\n func#0 @0\n 0: R1=ctx() R10=fp0\n 0: (bf) r6 = r1 ; R1=ctx() R6_w=ctx()\n 1: (79) r7 = *(u64 *)(r6 +144) ; R6_w=ctx() R7_w=flow_keys()\n 2: (b7) r8 = 1024 ; R8_w=1024\n 3: (37) r8 /= 1 ; R8_w=scalar()\n 4: (57) r8 \u0026= 1024 ; R8_w=scalar(smin=smin32=0,\n smax=umax=smax32=umax32=1024,var_off=(0x0; 0x400))\n 5: (0f) r7 += r8\n mark_precise: frame0: last_idx 5 first_idx 0 subseq_idx -1\n mark_precise: frame0: regs=r8 stack= before 4: (57) r8 \u0026= 1024\n mark_precise: frame0: regs=r8 stack= before 3: (37) r8 /= 1\n mark_precise: frame0: regs=r8 stack= before 2: (b7) r8 = 1024\n 6: R7_w=flow_keys(smin=smin32=0,smax=umax=smax32=umax32=1024,var_off\n =(0x0; 0x400)) R8_w=scalar(smin=smin32=0,smax=umax=smax32=umax32=1024,\n var_off=(0x0; 0x400))\n 6: (79) r0 = *(u64 *)(r7 +0) ; R0_w=scalar()\n 7: (95) exit\n\nThis prog loads flow_keys to r7, and adds the variable offset r8\nto r7, and finally causes out-of-bounds access:\n\n BUG: unable to handle page fault for address: ffffc90014c80038\n [...]\n Call Trace:\n \u003cTASK\u003e\n bpf_dispatcher_nop_func include/linux/bpf.h:1231 [inline]\n __bpf_prog_run include/linux/filter.h:651 [inline]\n bpf_prog_run include/linux/filter.h:658 [inline]\n bpf_prog_run_pin_on_cpu include/linux/filter.h:675 [inline]\n bpf_flow_dissect+0x15f/0x350 net/core/flow_dissector.c:991\n bpf_prog_test_run_flow_dissector+0x39d/0x620 net/bpf/test_run.c:1359\n bpf_prog_test_run kernel/bpf/syscall.c:4107 [inline]\n __sys_bpf+0xf8f/0x4560 kernel/bpf/syscall.c:5475\n __do_sys_bpf kernel/bpf/syscall.c:5561 [inline]\n __se_sys_bpf kernel/bpf/syscall.c:5559 [inline]\n __x64_sys_bpf+0x73/0xb0 kernel/bpf/syscall.c:5559\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0x3f/0x110 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x63/0x6b\n\nFix this by rejecting ptr alu with variable offset on flow_keys.\nApplying the patch rejects the program with \"R7 pointer arithmetic\non flow_keys prohibited\".",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26589",
"url": "https://www.suse.com/security/cve/CVE-2024-26589"
},
{
"category": "external",
"summary": "SUSE Bug 1220255 for CVE-2024-26589",
"url": "https://bugzilla.suse.com/1220255"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-15T12:19:06Z",
"details": "moderate"
}
],
"title": "CVE-2024-26589"
},
{
"cve": "CVE-2024-26591",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26591"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Fix re-attachment branch in bpf_tracing_prog_attach\n\nThe following case can cause a crash due to missing attach_btf:\n\n1) load rawtp program\n2) load fentry program with rawtp as target_fd\n3) create tracing link for fentry program with target_fd = 0\n4) repeat 3\n\nIn the end we have:\n\n- prog-\u003eaux-\u003edst_trampoline == NULL\n- tgt_prog == NULL (because we did not provide target_fd to link_create)\n- prog-\u003eaux-\u003eattach_btf == NULL (the program was loaded with attach_prog_fd=X)\n- the program was loaded for tgt_prog but we have no way to find out which one\n\n BUG: kernel NULL pointer dereference, address: 0000000000000058\n Call Trace:\n \u003cTASK\u003e\n ? __die+0x20/0x70\n ? page_fault_oops+0x15b/0x430\n ? fixup_exception+0x22/0x330\n ? exc_page_fault+0x6f/0x170\n ? asm_exc_page_fault+0x22/0x30\n ? bpf_tracing_prog_attach+0x279/0x560\n ? btf_obj_id+0x5/0x10\n bpf_tracing_prog_attach+0x439/0x560\n __sys_bpf+0x1cf4/0x2de0\n __x64_sys_bpf+0x1c/0x30\n do_syscall_64+0x41/0xf0\n entry_SYSCALL_64_after_hwframe+0x6e/0x76\n\nReturn -EINVAL in this situation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26591",
"url": "https://www.suse.com/security/cve/CVE-2024-26591"
},
{
"category": "external",
"summary": "SUSE Bug 1220254 for CVE-2024-26591",
"url": "https://bugzilla.suse.com/1220254"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-15T12:19:06Z",
"details": "moderate"
}
],
"title": "CVE-2024-26591"
},
{
"cve": "CVE-2024-26593",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26593"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ni2c: i801: Fix block process call transactions\n\nAccording to the Intel datasheets, software must reset the block\nbuffer index twice for block process call transactions: once before\nwriting the outgoing data to the buffer, and once again before\nreading the incoming data from the buffer.\n\nThe driver is currently missing the second reset, causing the wrong\nportion of the block buffer to be read.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26593",
"url": "https://www.suse.com/security/cve/CVE-2024-26593"
},
{
"category": "external",
"summary": "SUSE Bug 1220009 for CVE-2024-26593",
"url": "https://bugzilla.suse.com/1220009"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-15T12:19:06Z",
"details": "moderate"
}
],
"title": "CVE-2024-26593"
},
{
"cve": "CVE-2024-26595",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26595"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmlxsw: spectrum_acl_tcam: Fix NULL pointer dereference in error path\n\nWhen calling mlxsw_sp_acl_tcam_region_destroy() from an error path after\nfailing to attach the region to an ACL group, we hit a NULL pointer\ndereference upon \u0027region-\u003egroup-\u003etcam\u0027 [1].\n\nFix by retrieving the \u0027tcam\u0027 pointer using mlxsw_sp_acl_to_tcam().\n\n[1]\nBUG: kernel NULL pointer dereference, address: 0000000000000000\n[...]\nRIP: 0010:mlxsw_sp_acl_tcam_region_destroy+0xa0/0xd0\n[...]\nCall Trace:\n mlxsw_sp_acl_tcam_vchunk_get+0x88b/0xa20\n mlxsw_sp_acl_tcam_ventry_add+0x25/0xe0\n mlxsw_sp_acl_rule_add+0x47/0x240\n mlxsw_sp_flower_replace+0x1a9/0x1d0\n tc_setup_cb_add+0xdc/0x1c0\n fl_hw_replace_filter+0x146/0x1f0\n fl_change+0xc17/0x1360\n tc_new_tfilter+0x472/0xb90\n rtnetlink_rcv_msg+0x313/0x3b0\n netlink_rcv_skb+0x58/0x100\n netlink_unicast+0x244/0x390\n netlink_sendmsg+0x1e4/0x440\n ____sys_sendmsg+0x164/0x260\n ___sys_sendmsg+0x9a/0xe0\n __sys_sendmsg+0x7a/0xc0\n do_syscall_64+0x40/0xe0\n entry_SYSCALL_64_after_hwframe+0x63/0x6b",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26595",
"url": "https://www.suse.com/security/cve/CVE-2024-26595"
},
{
"category": "external",
"summary": "SUSE Bug 1220344 for CVE-2024-26595",
"url": "https://bugzilla.suse.com/1220344"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-15T12:19:06Z",
"details": "moderate"
}
],
"title": "CVE-2024-26595"
},
{
"cve": "CVE-2024-26598",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26598"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache\n\nThere is a potential UAF scenario in the case of an LPI translation\ncache hit racing with an operation that invalidates the cache, such\nas a DISCARD ITS command. The root of the problem is that\nvgic_its_check_cache() does not elevate the refcount on the vgic_irq\nbefore dropping the lock that serializes refcount changes.\n\nHave vgic_its_check_cache() raise the refcount on the returned vgic_irq\nand add the corresponding decrement after queueing the interrupt.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26598",
"url": "https://www.suse.com/security/cve/CVE-2024-26598"
},
{
"category": "external",
"summary": "SUSE Bug 1220326 for CVE-2024-26598",
"url": "https://bugzilla.suse.com/1220326"
},
{
"category": "external",
"summary": "SUSE Bug 1221129 for CVE-2024-26598",
"url": "https://bugzilla.suse.com/1221129"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-15T12:19:06Z",
"details": "important"
}
],
"title": "CVE-2024-26598"
},
{
"cve": "CVE-2024-26602",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26602"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsched/membarrier: reduce the ability to hammer on sys_membarrier\n\nOn some systems, sys_membarrier can be very expensive, causing overall\nslowdowns for everything. So put a lock on the path in order to\nserialize the accesses to prevent the ability for this to be called at\ntoo high of a frequency and saturate the machine.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26602",
"url": "https://www.suse.com/security/cve/CVE-2024-26602"
},
{
"category": "external",
"summary": "SUSE Bug 1220398 for CVE-2024-26602",
"url": "https://bugzilla.suse.com/1220398"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-15T12:19:06Z",
"details": "moderate"
}
],
"title": "CVE-2024-26602"
},
{
"cve": "CVE-2024-26603",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26603"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86/fpu: Stop relying on userspace for info to fault in xsave buffer\n\nBefore this change, the expected size of the user space buffer was\ntaken from fx_sw-\u003exstate_size. fx_sw-\u003exstate_size can be changed\nfrom user-space, so it is possible construct a sigreturn frame where:\n\n * fx_sw-\u003exstate_size is smaller than the size required by valid bits in\n fx_sw-\u003exfeatures.\n * user-space unmaps parts of the sigrame fpu buffer so that not all of\n the buffer required by xrstor is accessible.\n\nIn this case, xrstor tries to restore and accesses the unmapped area\nwhich results in a fault. But fault_in_readable succeeds because buf +\nfx_sw-\u003exstate_size is within the still mapped area, so it goes back and\ntries xrstor again. It will spin in this loop forever.\n\nInstead, fault in the maximum size which can be touched by XRSTOR (taken\nfrom fpstate-\u003euser_size).\n\n[ dhansen: tweak subject / changelog ]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26603",
"url": "https://www.suse.com/security/cve/CVE-2024-26603"
},
{
"category": "external",
"summary": "SUSE Bug 1220335 for CVE-2024-26603",
"url": "https://bugzilla.suse.com/1220335"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-15T12:19:06Z",
"details": "moderate"
}
],
"title": "CVE-2024-26603"
},
{
"cve": "CVE-2024-26607",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26607"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/bridge: sii902x: Fix probing race issue\n\nA null pointer dereference crash has been observed rarely on TI\nplatforms using sii9022 bridge:\n\n[ 53.271356] sii902x_get_edid+0x34/0x70 [sii902x]\n[ 53.276066] sii902x_bridge_get_edid+0x14/0x20 [sii902x]\n[ 53.281381] drm_bridge_get_edid+0x20/0x34 [drm]\n[ 53.286305] drm_bridge_connector_get_modes+0x8c/0xcc [drm_kms_helper]\n[ 53.292955] drm_helper_probe_single_connector_modes+0x190/0x538 [drm_kms_helper]\n[ 53.300510] drm_client_modeset_probe+0x1f0/0xbd4 [drm]\n[ 53.305958] __drm_fb_helper_initial_config_and_unlock+0x50/0x510 [drm_kms_helper]\n[ 53.313611] drm_fb_helper_initial_config+0x48/0x58 [drm_kms_helper]\n[ 53.320039] drm_fbdev_dma_client_hotplug+0x84/0xd4 [drm_dma_helper]\n[ 53.326401] drm_client_register+0x5c/0xa0 [drm]\n[ 53.331216] drm_fbdev_dma_setup+0xc8/0x13c [drm_dma_helper]\n[ 53.336881] tidss_probe+0x128/0x264 [tidss]\n[ 53.341174] platform_probe+0x68/0xc4\n[ 53.344841] really_probe+0x188/0x3c4\n[ 53.348501] __driver_probe_device+0x7c/0x16c\n[ 53.352854] driver_probe_device+0x3c/0x10c\n[ 53.357033] __device_attach_driver+0xbc/0x158\n[ 53.361472] bus_for_each_drv+0x88/0xe8\n[ 53.365303] __device_attach+0xa0/0x1b4\n[ 53.369135] device_initial_probe+0x14/0x20\n[ 53.373314] bus_probe_device+0xb0/0xb4\n[ 53.377145] deferred_probe_work_func+0xcc/0x124\n[ 53.381757] process_one_work+0x1f0/0x518\n[ 53.385770] worker_thread+0x1e8/0x3dc\n[ 53.389519] kthread+0x11c/0x120\n[ 53.392750] ret_from_fork+0x10/0x20\n\nThe issue here is as follows:\n\n- tidss probes, but is deferred as sii902x is still missing.\n- sii902x starts probing and enters sii902x_init().\n- sii902x calls drm_bridge_add(). Now the sii902x bridge is ready from\n DRM\u0027s perspective.\n- sii902x calls sii902x_audio_codec_init() and\n platform_device_register_data()\n- The registration of the audio platform device causes probing of the\n deferred devices.\n- tidss probes, which eventually causes sii902x_bridge_get_edid() to be\n called.\n- sii902x_bridge_get_edid() tries to use the i2c to read the edid.\n However, the sii902x driver has not set up the i2c part yet, leading\n to the crash.\n\nFix this by moving the drm_bridge_add() to the end of the\nsii902x_init(), which is also at the very end of sii902x_probe().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26607",
"url": "https://www.suse.com/security/cve/CVE-2024-26607"
},
{
"category": "external",
"summary": "SUSE Bug 1220736 for CVE-2024-26607",
"url": "https://bugzilla.suse.com/1220736"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-15T12:19:06Z",
"details": "moderate"
}
],
"title": "CVE-2024-26607"
},
{
"cve": "CVE-2024-26622",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26622"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntomoyo: fix UAF write bug in tomoyo_write_control()\n\nSince tomoyo_write_control() updates head-\u003ewrite_buf when write()\nof long lines is requested, we need to fetch head-\u003ewrite_buf after\nhead-\u003eio_sem is held. Otherwise, concurrent write() requests can\ncause use-after-free-write and double-free problems.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26622",
"url": "https://www.suse.com/security/cve/CVE-2024-26622"
},
{
"category": "external",
"summary": "SUSE Bug 1220825 for CVE-2024-26622",
"url": "https://bugzilla.suse.com/1220825"
},
{
"category": "external",
"summary": "SUSE Bug 1220828 for CVE-2024-26622",
"url": "https://bugzilla.suse.com/1220828"
},
{
"category": "external",
"summary": "SUSE Bug 1224298 for CVE-2024-26622",
"url": "https://bugzilla.suse.com/1224298"
},
{
"category": "external",
"summary": "SUSE Bug 1224878 for CVE-2024-26622",
"url": "https://bugzilla.suse.com/1224878"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-15T12:19:06Z",
"details": "important"
}
],
"title": "CVE-2024-26622"
}
]
}
SUSE-SU-2024:0858-1
Vulnerability from csaf_suse - Published: 2024-03-13 00:09 - Updated: 2024-03-13 00:09Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise 15 SP5 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2019-25162: Fixed a potential use after free (bsc#1220409).\n- CVE-2021-46923: Fixed reference leakage in fs/mount_setattr (bsc#1220457).\n- CVE-2021-46924: Fixed fix memory leak in device probe and remove (bsc#1220459)\n- CVE-2021-46932: Fixed missing work initialization before device registration (bsc#1220444)\n- CVE-2023-28746: Fixed Register File Data Sampling (bsc#1213456).\n- CVE-2023-5197: Fixed se-after-free due to addition and removal of rules from chain bindings within the same transaction (bsc#1218216).\n- CVE-2023-52340: Fixed ICMPv6 \u201cPacket Too Big\u201d packets force a DoS of the Linux kernel by forcing 100% CPU (bsc#1219295).\n- CVE-2023-52429: Fixed potential DoS in dm_table_create in drivers/md/dm-table.c (bsc#1219827).\n- CVE-2023-52439: Fixed use-after-free in uio_open (bsc#1220140).\n- CVE-2023-52443: Fixed crash when parsed profile name is empty (bsc#1220240).\n- CVE-2023-52445: Fixed use after free on context disconnection (bsc#1220241).\n- CVE-2023-52447: Fixed map_fd_put_ptr() signature kABI workaround (bsc#1220251).\n- CVE-2023-52448: Fixed kernel NULL pointer dereference in gfs2_rgrp_dump (bsc#1220253).\n- CVE-2023-52449: Fixed gluebi NULL pointer dereference caused by ftl notifier (bsc#1220238).\n- CVE-2023-52451: Fixed access beyond end of drmem array (bsc#1220250).\n- CVE-2023-52452: Fixed Fix accesses to uninit stack slots (bsc#1220257).\n- CVE-2023-52456: Fixed tx statemachine deadlock (bsc#1220364).\n- CVE-2023-52457: Fixed skipped resource freeing if pm_runtime_resume_and_get() failed (bsc#1220350).\n- CVE-2023-52463: Fixed null pointer dereference in efivarfs (bsc#1220328).\n- CVE-2023-52464: Fixed possible out-of-bounds string access (bsc#1220330)\n- CVE-2023-52475: Fixed use-after-free in powermate_config_complete (bsc#1220649)\n- CVE-2023-52478: Fixed kernel crash on receiver USB disconnect (bsc#1220796)\n- CVE-2023-6817: Fixed use-after-free in nft_pipapo_walk (bsc#1218195).\n- CVE-2024-0607: Fixed 64-bit load issue in nft_byteorder_eval() (bsc#1218915).\n- CVE-2024-1151: Fixed unlimited number of recursions from action sets (bsc#1219835).\n- CVE-2024-23849: Fixed array-index-out-of-bounds in rds_cmsg_recv (bsc#1219127).\n- CVE-2024-23850: Fixed double free of anonymous device after snapshot creation failure (bsc#1219126).\n- CVE-2024-23851: Fixed crash in copy_params in drivers/md/dm-ioctl.c (bsc#1219146).\n- CVE-2024-25744: Fixed Security issue with int 80 interrupt vector (bsc#1217927).\n- CVE-2024-26585: Fixed race between tx work scheduling and socket close (bsc#1220187).\n- CVE-2024-26586: Fixed stack corruption (bsc#1220243).\n- CVE-2024-26589: Fixed out of bounds read due to variable offset alu on PTR_TO_FLOW_KEYS (bsc#1220255).\n- CVE-2024-26591: Fixed re-attachment branch in bpf_tracing_prog_attach (bsc#1220254).\n- CVE-2024-26593: Fixed block process call transactions (bsc#1220009).\n- CVE-2024-26595: Fixed NULL pointer dereference in error path (bsc#1220344).\n- CVE-2024-26598: Fixed potential UAF in LPI translation cache (bsc#1220326).\n- CVE-2024-26602: Fixed overall slowdowns with sys_membarrier (bsc1220398).\n- CVE-2024-26603: Fixed infinite loop via #PF handling (bsc#1220335).\n- CVE-2024-26622: Fixed UAF write bug in tomoyo_write_control() (bsc#1220825).\n\nThe following non-security bugs were fixed:\n\n- acpi: apei: set memory failure flags as mf_action_required on synchronous events (git-fixes).\n- acpi: button: add lid disable dmi quirk for nextbook ares 8a (git-fixes).\n- acpi: extlog: fix null pointer dereference check (git-fixes).\n- acpi: resource: add asus model s5402za to quirks (git-fixes).\n- acpi: resource: skip irq override on asus expertbook b1502cba (git-fixes).\n- acpi: resource: skip irq override on asus expertbook b2402cba (git-fixes).\n- acpi: video: add backlight=native dmi quirk for apple imac11,3 (git-fixes).\n- acpi: video: add backlight=native dmi quirk for apple imac12,1 and imac12,2 (git-fixes).\n- acpi: video: add backlight=native dmi quirk for lenovo thinkpad x131e (3371 amd version) (git-fixes).\n- acpi: video: add quirk for the colorful x15 at 23 laptop (git-fixes).\n- add reference to recently released cve\n- afs: fix the usage of read_seqbegin_or_lock() in afs_find_server*() (git-fixes).\n- afs: fix the usage of read_seqbegin_or_lock() in afs_lookup_volume_rcu() (git-fixes).\n- afs: hide silly-rename files from userspace (git-fixes).\n- afs: increase buffer size in afs_update_volume_status() (git-fixes).\n- ahci: asm1166: correct count of reported ports (git-fixes).\n- alsa: drop leftover snd-rtctimer stuff from makefile (git-fixes).\n- alsa: firewire-lib: fix to check cycle continuity (git-fixes).\n- alsa: hda/conexant: add quirk for sws js201d (git-fixes).\n- alsa: hda/realtek: apply headset jack quirk for non-bass alc287 thinkpads (git-fixes).\n- alsa: hda/realtek: cs35l41: fix device id / model name (git-fixes).\n- alsa: hda/realtek: cs35l41: fix order and duplicates in quirks table (git-fixes).\n- alsa: hda/realtek: enable headset mic on vaio vjfe-adl (git-fixes).\n- alsa: hda/realtek: enable mute led on hp laptop 14-fq0xxx (git-fixes).\n- alsa: hda/realtek: fix mute/micmute led for hp mt645 (git-fixes).\n- alsa: hda/realtek: fix mute/micmute leds for hp zbook power (git-fixes).\n- alsa: hda/realtek: fix the external mic not being recognised for acer swift 1 sf114-32 (git-fixes).\n- alsa: usb-audio: add a quirk for yamaha yit-w12tx transmitter (git-fixes).\n- alsa: usb-audio: add delay quirk for motu m series 2nd revision (git-fixes).\n- alsa: usb-audio: add quirk for rode nt-usb+ (git-fixes).\n- alsa: usb-audio: check presence of valid altsetting control (git-fixes).\n- alsa: usb-audio: ignore clock selector errors for single connection (git-fixes).\n- alsa: usb-audio: more relaxed check of midi jack names (git-fixes).\n- alsa: usb-audio: sort quirk table entries (git-fixes).\n- arm64: entry: fix arm64_workaround_speculative_unpriv_load (bsc#1219443)\n- arm64: entry: preserve/restore x29 even for compat tasks (bsc#1219443)\n- arm64: entry: simplify tramp_alias macro and tramp_exit routine (bsc#1219443)\n- arm64: errata: add cortex-a510 speculative unprivileged load (bsc#1219443) enable workaround.\n- arm64: errata: add cortex-a520 speculative unprivileged load (bsc#1219443) enable workaround without kabi break.\n- arm64: errata: mitigate ampere1 erratum ac03_cpu_38 at stage-2 (git-fixes) enable ampere_erratum_ac03_cpu_38 workaround without kabi break\n- arm64: irq: set the correct node for shadow call stack (git-fixes)\n- arm64: irq: set the correct node for vmap stack (git-fixes)\n- arm64: rename arm64_workaround_2966298 (bsc#1219443)\n- arm64: subscribe microsoft azure cobalt 100 to arm neoverse n2 errata (git-fixes)\n- asoc: doc: fix undefined snd_soc_dapm_nopm argument (git-fixes).\n- asoc: rt5645: fix deadlock in rt5645_jack_detect_work() (git-fixes).\n- asoc: sof: ipc3: fix message bounds on ipc ops (git-fixes).\n- asoc: sunxi: sun4i-spdif: add support for allwinner h616 (git-fixes).\n- atm: idt77252: fix a memleak in open_card_ubr0 (git-fixes).\n- bluetooth: avoid potential use-after-free in hci_error_reset (git-fixes).\n- bluetooth: enforce validation on max value of connection interval (git-fixes).\n- bluetooth: hci_event: fix handling of hci_ev_io_capa_request (git-fixes).\n- bluetooth: hci_event: fix wrongly recorded wakeup bd_addr (git-fixes).\n- bluetooth: hci_sync: check the correct flag before starting a scan (git-fixes).\n- bluetooth: hci_sync: fix accept_list when attempting to suspend (git-fixes).\n- bluetooth: l2cap: fix possible multiple reject send (git-fixes).\n- bluetooth: qca: fix wrong event type for patch config command (git-fixes).\n- bpf: fix verification of indirect var-off stack access (git-fixes).\n- bpf: guard stack limits against 32bit overflow (git-fixes).\n- bpf: minor logging improvement (bsc#1220257).\n- bus: moxtet: add spi device table (git-fixes).\n- cachefiles: fix memory leak in cachefiles_add_cache() (bsc#1220267).\n- can: j1939: fix uaf in j1939_sk_match_filter during setsockopt(so_j1939_filter) (git-fixes).\n- crypto: api - disallow identical driver names (git-fixes).\n- crypto: ccp - fix null pointer dereference in __sev_platform_shutdown_locked (git-fixes).\n- crypto: octeontx2 - fix cptvf driver cleanup (git-fixes).\n- crypto: stm32/crc32 - fix parsing list of devices (git-fixes).\n- dmaengine: fsl-qdma: fix a memory leak related to the queue command dma (git-fixes).\n- dmaengine: fsl-qdma: fix soc may hang on 16 byte unaligned read (git-fixes).\n- dmaengine: fsl-qdma: increase size of \u0027irq_name\u0027 (git-fixes).\n- dmaengine: fsl-qdma: init irq after reg initialization (git-fixes).\n- dmaengine: ptdma: use consistent dma masks (git-fixes).\n- dmaengine: shdma: increase size of \u0027dev_id\u0027 (git-fixes).\n- dmaengine: ti: edma: add some null pointer checks to the edma_probe (git-fixes).\n- driver core: fix device_link_flag_is_sync_state_only() (git-fixes).\n- drm/amd/display: fix memory leak in dm_sw_fini() (git-fixes).\n- drm/amd/display: fix possible buffer overflow in \u0027find_dcfclk_for_voltage()\u0027 (git-fixes).\n- drm/amd/display: fix possible null dereference on device remove/driver unload (git-fixes).\n- drm/amd/display: increase frame-larger-than for all display_mode_vba files (git-fixes).\n- drm/amd/display: increased min_dcfclk_mhz and min_fclk_mhz (git-fixes).\n- drm/amd/display: preserve original aspect ratio in create stream (git-fixes).\n- drm/amdgpu/display: initialize gamma correction mode variable in dcn30_get_gamcor_current() (git-fixes).\n- drm/amdgpu: reset gpu for s3 suspend abort case (git-fixes).\n- drm/amdgpu: skip to program gfxdec registers for suspend abort (git-fixes).\n- drm/buddy: fix range bias (git-fixes).\n- drm/crtc: fix uninitialized variable use even harder (git-fixes).\n- drm/i915/gvt: fix uninitialized variable in handle_mmio() (git-fixes).\n- drm/msm/dp: return correct colorimetry for dp_test_dynamic_range_cea case (git-fixes).\n- drm/msm/dpu: check for valid hw_pp in dpu_encoder_helper_phys_cleanup (git-fixes).\n- drm/msms/dp: fixed link clock divider bits be over written in bpc unknown case (git-fixes).\n- drm/prime: support page array \u003e= 4gb (git-fixes).\n- drm/syncobj: call drm_syncobj_fence_add_wait when wait_available flag is set (git-fixes).\n- drm/ttm: fix an invalid freeing on already freed page in error path (git-fixes).\n- drop bcm5974 input patch causing a regression (bsc#1220030)\n- efi/capsule-loader: fix incorrect allocation size (git-fixes).\n- efi: do not add memblocks for soft-reserved memory (git-fixes).\n- efi: runtime: fix potential overflow of soft-reserved region size (git-fixes).\n- fbcon: always restore the old font data in fbcon_do_set_font() (git-fixes).\n- fbdev: savage: error out if pixclock equals zero (git-fixes).\n- fbdev: sis: error out if pixclock equals zero (git-fixes).\n- firewire: core: send bus reset promptly on gap count error (git-fixes).\n- fs: dlm: fix build with config_ipv6 disabled (git-fixes).\n- fs:jfs:ubsan:array-index-out-of-bounds in dbadjtree (git-fixes).\n- gpio: 74x164: enable output pins after registers are reset (git-fixes).\n- gpio: fix resource unwinding order in error path (git-fixes).\n- gpiolib: acpi: ignore touchpad wakeup on gpd g1619-04 (git-fixes).\n- gpiolib: fix the error path order in gpiochip_add_data_with_key() (git-fixes).\n- hid: apple: add 2021 magic keyboard fn key mapping (git-fixes).\n- hid: apple: add support for the 2021 magic keyboard (git-fixes).\n- hid: wacom: do not register input devices until after hid_hw_start (git-fixes).\n- hid: wacom: generic: avoid reporting a serial of \u00270\u0027 to userspace (git-fixes).\n- hwmon: (aspeed-pwm-tacho) mutex for tach reading (git-fixes).\n- hwmon: (coretemp) enlarge per package core count limit (git-fixes).\n- hwmon: (coretemp) fix bogus core_id to attr name mapping (git-fixes).\n- hwmon: (coretemp) fix out-of-bounds memory access (git-fixes).\n- i2c: i801: fix block process call transactions (git-fixes).\n- i2c: i801: remove i801_set_block_buffer_mode (git-fixes).\n- i2c: imx: add timer for handling the stop condition (git-fixes).\n- i2c: imx: when being a target, mark the last read as processed (git-fixes).\n- i3c: master: cdns: update maximum prescaler value for i2c clock (git-fixes).\n- ib/hfi1: fix a memleak in init_credit_return (git-fixes)\n- ib/hfi1: fix sdma.h tx-\u003enum_descs off-by-one error (git-fixes)\n- iio: accel: bma400: fix a compilation problem (git-fixes).\n- iio: adc: ad7091r: set alert bit in config register (git-fixes).\n- iio: core: fix memleak in iio_device_register_sysfs (git-fixes).\n- iio: hid-sensor-als: return 0 for hid_usage_sensor_time_timestamp (git-fixes).\n- iio: magnetometer: rm3100: add boundary check for the value read from rm3100_reg_tmrc (git-fixes).\n- input: iqs269a - switch to define_simple_dev_pm_ops() and pm_sleep_ptr() (git-fixes).\n- input: xpad - add lenovo legion go controllers (git-fixes).\n- irqchip/gic-v3-its: fix gicv4.1 vpe affinity update (git-fixes).\n- irqchip/irq-brcmstb-l2: add write memory barrier before exit (git-fixes).\n- jfs: fix array-index-out-of-bounds in dbadjtree (git-fixes).\n- jfs: fix array-index-out-of-bounds in dinewext (git-fixes).\n- jfs: fix slab-out-of-bounds read in dtsearch (git-fixes).\n- jfs: fix uaf in jfs_evict_inode (git-fixes).\n- kbuild: fix changing elf file type for output of gen_btf for big endian (git-fixes).\n- kvm: s390: fix cc for successful pqap (git-fixes bsc#1219839).\n- kvm: s390: fix setting of fpc register (git-fixes bsc#1220392).\n- kvm: s390: vsie: fix race during shadow creation (git-fixes bsc#1220393).\n- kvm: vmx: move verw closer to vmentry for mds mitigation (git-fixes).\n- kvm: vmx: use bt+jnc, i.e. eflags.cf to select vmresume vs. vmlaunch (git-fixes).\n- lan78xx: enable auto speed configuration for lan7850 if no eeprom is detected (git-fixes).\n- leds: trigger: panic: do not register panic notifier if creating the trigger failed (git-fixes).\n- lib/stackdepot: add depot_fetch_stack helper (jsc-ped#7423).\n- lib/stackdepot: add refcount for records (jsc-ped#7423).\n- lib/stackdepot: fix first entry having a 0-handle (jsc-ped#7423).\n- lib/stackdepot: move stack_record struct definition into the header (jsc-ped#7423).\n- libsubcmd: fix memory leak in uniq() (git-fixes).\n- media: ddbridge: fix an error code problem in ddb_probe (git-fixes).\n- media: ir_toy: fix a memleak in irtoy_tx (git-fixes).\n- media: rc: bpf attach/detach requires write permission (git-fixes).\n- media: rockchip: rga: fix swizzling for rgb formats (git-fixes).\n- media: stk1160: fixed high volume of stk1160_dbg messages (git-fixes).\n- mfd: syscon: fix null pointer dereference in of_syscon_register() (git-fixes).\n- mm,page_owner: display all stacks and their count (jsc-ped#7423).\n- mm,page_owner: filter out stacks by a threshold (jsc-ped#7423).\n- mm,page_owner: implement the tracking of the stacks count (jsc-ped#7423).\n- mm,page_owner: maintain own list of stack_records structs (jsc-ped#7423).\n- mm,page_owner: update documentation regarding page_owner_stacks (jsc-ped#7423).\n- mm/hwpoison: fix unpoison_memory() (bsc#1218663).\n- mm/hwpoison: mf_mutex for soft offline and unpoison (bsc#1218663).\n- mm/hwpoison: remove mf_msg_buddy_2nd and mf_msg_poisoned_huge (bsc#1218663).\n- mm: memory-failure: fix potential unexpected return value from unpoison_memory() (git-fixes).\n- mmc: core: fix emmc initialization with 1-bit bus connection (git-fixes).\n- mmc: core: use mrq.sbc in close-ended ffu (git-fixes).\n- mmc: mmc_spi: remove custom dma mapped buffers (git-fixes).\n- mmc: sdhci-xenon: add timeout for phy init complete (git-fixes).\n- mmc: sdhci-xenon: fix phy init clock stability (git-fixes).\n- mmc: slot-gpio: allow non-sleeping gpio ro (git-fixes).\n- modpost: trim leading spaces when processing source files list (git-fixes).\n- mtd: spinand: gigadevice: fix the get ecc status issue (git-fixes).\n- net: usb: dm9601: fix wrong return value in dm9601_mdio_read (git-fixes).\n- netfs, fscache: prevent oops in fscache_put_cache() (bsc#1220003).\n- nilfs2: fix data corruption in dsync block recovery for small block sizes (git-fixes).\n- nilfs2: replace warn_ons for invalid dat metadata block requests (git-fixes).\n- nouveau/svm: fix kvcalloc() argument order (git-fixes).\n- nouveau: fix function cast warnings (git-fixes).\n- ntfs: check overflow when iterating attr_records (git-fixes).\n- ntfs: fix use-after-free in ntfs_attr_find() (git-fixes).\n- nvme-fabrics: fix i/o connect error handling (git-fixes).\n- nvme-host: fix the updating of the firmware version (git-fixes).\n- pci/aer: decode requester id when no error info found (git-fixes).\n- pci: add no pm reset quirk for nvidia spectrum devices (git-fixes).\n- pci: add pci_header_type_mfd definition (bsc#1220021).\n- pci: fix 64gt/s effective data rate calculation (git-fixes).\n- pci: only override amd usb controller if required (git-fixes).\n- pci: switchtec: fix stdev_release() crash after surprise hot remove (git-fixes).\n- platform/x86: thinkpad_acpi: only update profile if successfully converted (git-fixes).\n- platform/x86: touchscreen_dmi: add info for the teclast x16 plus tablet (git-fixes).\n- platform/x86: touchscreen_dmi: allow partial (prefix) matches for acpi names (git-fixes).\n- pm: core: remove unnecessary (void *) conversions (git-fixes).\n- pm: runtime: have devm_pm_runtime_enable() handle pm_runtime_dont_use_autosuspend() (git-fixes).\n- pnp: acpi: fix fortify warning (git-fixes).\n- power: supply: bq27xxx-i2c: do not free non existing irq (git-fixes).\n- powerpc/64: set task pt_regs-\u003elink to the lr value on scv entry (bsc#1194869).\n- powerpc/powernv: fix fortify source warnings in opal-prd.c (bsc#1194869).\n- powerpc/pseries: add a clear modifier to ibm,pa/pi-features parser (bsc#1220348).\n- powerpc/pseries: rework lppaca_shared_proc() to avoid debug_preempt (bsc#1194869).\n- powerpc/pseries: set cpu_ftr_dbell according to ibm,pi-features (bsc#1220348).\n- powerpc/watchpoint: disable pagefaults when getting user instruction (bsc#1194869).\n- powerpc/watchpoints: annotate atomic context in more places (bsc#1194869).\n- powerpc/watchpoints: disable preemption in thread_change_pc() (bsc#1194869).\n- powerpc: add crtsavres.o to always-y instead of extra-y (bsc#1194869).\n- powerpc: do not include lppaca.h in paca.h (bsc#1194869).\n- pstore/ram: fix crash when setting number of cpus to an odd number (git-fixes).\n- ras/amd/atl: add mi300 row retirement support (jsc#ped-7618).\n- ras/amd/atl: fix bit overflow in denorm_addr_df4_np2() (git-fixes).\n- ras: introduce a fru memory poison manager (jsc#ped-7618).\n- rdma/bnxt_re: add a missing check in bnxt_qplib_query_srq (git-fixes)\n- rdma/bnxt_re: return error for srq resize (git-fixes)\n- rdma/core: fix uninit-value access in ib_get_eth_speed() (bsc#1219934).\n- rdma/core: get ib width and speed from netdev (bsc#1219934).\n- rdma/irdma: add ae for too many rnrs (git-fixes)\n- rdma/irdma: fix kasan issue with tasklet (git-fixes)\n- rdma/irdma: set the cq read threshold for gen 1 (git-fixes)\n- rdma/irdma: validate max_send_wr and max_recv_wr (git-fixes)\n- rdma/qedr: fix qedr_create_user_qp error flow (git-fixes)\n- rdma/srpt: fix function pointer cast warnings (git-fixes)\n- rdma/srpt: support specifying the srpt_service_guid parameter (git-fixes)\n- refresh patches.suse/dm_blk_ioctl-implement-path-failover-for-sg_io (bsc#1216776, bsc#1220277)\n- regulator: core: only increment use_count when enable_count changes (git-fixes).\n- regulator: pwm-regulator: add validity checks in continuous .get_voltage (git-fixes).\n- revert \u0027drm/amd/display: increased min_dcfclk_mhz and min_fclk_mhz\u0027 (git-fixes).\n- revert \u0027drm/amd/pm: resolve reboot exception for si oland\u0027 (git-fixes).\n- revert \u0027drm/amd: flush any delayed gfxoff on suspend entry\u0027 (git-fixes).\n- rpm/kernel-binary.spec.in: install scripts/gdb when enabled in config (bsc#1219653) they are put into -devel subpackage. and a proper link to /usr/share/gdb/auto-load/ is created.\n- s390/qeth: fix potential loss of l3-ip@ in case of network issues (git-fixes bsc#1219840).\n- s390: use the correct count for __iowrite64_copy() (git-fixes bsc#1220317).\n- sched/membarrier: reduce the ability to hammer on sys_membarrier (git-fixes).\n- scsi: core: move scsi_host_busy() out of host lock for waking up eh handler (git-fixes).\n- scsi: core: move scsi_host_busy() out of host lock if it is for per-command (git-fixes).\n- scsi: fnic: move fnic_fnic_flush_tx() to a work queue (git-fixes bsc#1219141).\n- scsi: hisi_sas: prevent parallel flr and controller reset (git-fixes).\n- scsi: ibmvfc: limit max hw queues by num_online_cpus() (bsc#1220106).\n- scsi: ibmvfc: open-code reset loop for target reset (bsc#1220106).\n- scsi: isci: fix an error code problem in isci_io_request_build() (git-fixes).\n- scsi: lpfc: add condition to delete ndlp object after sending bls_rjt to an abts (bsc#1220021).\n- scsi: lpfc: allow lpfc_plogi_confirm_nport() logic to execute for fabric nodes (bsc#1220021).\n- scsi: lpfc: change lpfc_vport fc_flag member into a bitmask (bsc#1220021).\n- scsi: lpfc: change lpfc_vport load_flag member into a bitmask (bsc#1220021).\n- scsi: lpfc: change nlp state statistic counters into atomic_t (bsc#1220021).\n- scsi: lpfc: copyright updates for 14.4.0.0 patches (bsc#1220021).\n- scsi: lpfc: fix failure to delete vports when discovery is in progress (bsc#1220021).\n- scsi: lpfc: fix possible memory leak in lpfc_rcv_padisc() (bsc#1220021).\n- scsi: lpfc: initialize status local variable in lpfc_sli4_repost_sgl_list() (bsc#1220021).\n- scsi: lpfc: move handling of reset congestion statistics events (bsc#1220021).\n- scsi: lpfc: protect vport fc_nodes list with an explicit spin lock (bsc#1220021).\n- scsi: lpfc: remove d_id swap log message from trace event logger (bsc#1220021).\n- scsi: lpfc: remove nlp_rcv_plogi early return during rscn processing for ndlps (bsc#1220021).\n- scsi: lpfc: remove shost_lock protection for fc_host_port shost apis (bsc#1220021).\n- scsi: lpfc: replace deprecated strncpy() with strscpy() (bsc#1220021).\n- scsi: lpfc: save fpin frequency statistics upon receipt of peer cgn notifications (bsc#1220021).\n- scsi: lpfc: update lpfc version to 14.4.0.0 (bsc#1220021).\n- scsi: lpfc: use pci_header_type_mfd instead of literal (bsc#1220021).\n- scsi: lpfc: use sg_dma_len() api to get struct scatterlist\u0027s length (bsc#1220021).\n- scsi: mpi3mr: refresh sdev queue depth after controller reset (git-fixes).\n- scsi: revert \u0027scsi: fcoe: fix potential deadlock on \u0026fip-\u003ectlr_lock\u0027 (git-fixes bsc#1219141).\n- serial: 8250: remove serial_rs485 sanitization from em485 (git-fixes).\n- spi-mxs: fix chipselect glitch (git-fixes).\n- spi: hisi-sfc-v3xx: return irq_none if no interrupts were detected (git-fixes).\n- spi: ppc4xx: drop write-only variable (git-fixes).\n- spi: sh-msiof: avoid integer overflow in constants (git-fixes).\n- staging: iio: ad5933: fix type mismatch regression (git-fixes).\n- supported.conf: remove external flag from ibm supported modules. (bsc#1209412)\n- tcp: fix tcp_mtup_probe_success vs wrong snd_cwnd (bsc#1218450).\n- tomoyo: fix uaf write bug in tomoyo_write_control() (git-fixes).\n- topology/sysfs: add format parameter to macro defining \u0027show\u0027 functions for proc (jsc#ped-7618).\n- topology/sysfs: add ppin in sysfs under cpu topology (jsc#ped-7618).\n- tty: allow tiocslcktrmios with cap_checkpoint_restore (git-fixes).\n- ubsan: array-index-out-of-bounds in dtsplitroot (git-fixes).\n- usb: cdns3: fix memory double free when handle zero packet (git-fixes).\n- usb: cdns3: fixed memory use after free at cdns3_gadget_ep_disable() (git-fixes).\n- usb: cdns3: modify the return value of cdns_set_active () to void when config_pm_sleep is disabled (git-fixes).\n- usb: cdns3: put the cdns set active part outside the spin lock (git-fixes).\n- usb: cdns: readd old api (git-fixes).\n- usb: cdnsp: blocked some cdns3 specific code (git-fixes).\n- usb: cdnsp: fixed issue with incorrect detecting cdnsp family controllers (git-fixes).\n- usb: dwc3: gadget: do not disconnect if not started (git-fixes).\n- usb: dwc3: gadget: handle ep0 request dequeuing properly (git-fixes).\n- usb: dwc3: gadget: ignore end transfer delay on teardown (git-fixes).\n- usb: dwc3: gadget: queue pm runtime idle on disconnect event (git-fixes).\n- usb: dwc3: gadget: refactor ep0 forced stall/restart into a separate api (git-fixes).\n- usb: dwc3: gadget: submit endxfer command if delayed during disconnect (git-fixes).\n- usb: dwc3: host: set xhci_sg_trb_cache_size_quirk (git-fixes).\n- usb: f_mass_storage: forbid async queue when shutdown happen (git-fixes).\n- usb: gadget: core: add missing kerneldoc for vbus_work (git-fixes).\n- usb: gadget: core: adjust uevent timing on gadget unbind (git-fixes).\n- usb: gadget: core: help prevent panic during uvc unconfigure (git-fixes).\n- usb: gadget: core: remove unbalanced mutex_unlock in usb_gadget_activate (git-fixes).\n- usb: gadget: f_hid: fix report descriptor allocation (git-fixes).\n- usb: gadget: fix obscure lockdep violation for udc_mutex (git-fixes).\n- usb: gadget: fix use-after-free read in usb_udc_uevent() (git-fixes).\n- usb: gadget: fsl_qe_udc: validate endpoint index for ch9 udc (git-fixes).\n- usb: gadget: ncm: avoid dropping datagrams of properly parsed ntbs (git-fixes).\n- usb: gadget: udc: core: offload usb_udc_vbus_handler processing (git-fixes).\n- usb: gadget: udc: core: prevent soft_connect_store() race (git-fixes).\n- usb: gadget: udc: handle gadget_connect failure during bind operation (git-fixes).\n- usb: hub: check for alternate port before enabling a_alt_hnp_support (bsc#1218527).\n- usb: hub: replace hardcoded quirk value with bit() macro (git-fixes).\n- usb: roles: do not get/set_role() when usb_role_switch is unregistered (git-fixes).\n- usb: roles: fix null pointer issue when put module\u0027s reference (git-fixes).\n- usb: serial: cp210x: add id for imst im871a-usb (git-fixes).\n- usb: serial: option: add fibocom fm101-gl variant (git-fixes).\n- usb: serial: qcserial: add new usb-id for dell wireless dw5826e (git-fixes).\n- watchdog: it87_wdt: keep wdtctrl bit 3 unmodified for it8784/it8786 (git-fixes).\n- wifi: ath11k: fix registration of 6ghz-only phy without the full channel range (git-fixes).\n- wifi: ath9k: fix potential array-index-out-of-bounds read in ath9k_htc_txstatus() (git-fixes).\n- wifi: cfg80211: fix missing interfaces when dumping (git-fixes).\n- wifi: cfg80211: free beacon_ies when overridden from hidden bss (git-fixes).\n- wifi: iwlwifi: fix some error codes (git-fixes).\n- wifi: iwlwifi: mvm: avoid baid size integer overflow (git-fixes).\n- wifi: iwlwifi: uninitialized variable in iwl_acpi_get_ppag_table() (git-fixes).\n- wifi: mac80211: adding missing drv_mgd_complete_tx() call (git-fixes).\n- wifi: mac80211: fix race condition on enabling fast-xmit (git-fixes).\n- wifi: nl80211: reject iftype change with mesh id change (git-fixes).\n- wifi: rt2x00: restart beacon queue when hardware reset (git-fixes).\n- wifi: rtl8xxxu: add additional usb ids for rtl8192eu devices (git-fixes).\n- wifi: rtlwifi: rtl8723{be,ae}: using calculate_bit_shift() (git-fixes).\n- wifi: wext-core: fix -wstringop-overflow warning in ioctl_standard_iw_point() (git-fixes).\n- x86/asm: add _asm_rip() macro for x86-64 (%rip) suffix (git-fixes).\n- x86/bugs: add asm helpers for executing verw (git-fixes).\n- x86/bugs: use alternative() instead of mds_user_clear static key (git-fixes). also add mds_user_clear to kabi severities since it\u0027s strictly mitigation related so should be low risk.\n- x86/cpu: x86_feature_intel_ppin finally had a cpuid bit (jsc#ped-7618).\n- x86/entry_32: add verw just before userspace transition (git-fixes).\n- x86/entry_64: add verw just before userspace transition (git-fixes).\n- x86/mm: fix memory encryption features advertisement (bsc#1206453).\n- xfs: remove unused fields from struct xbtree_ifakeroot (git-fixes).\n- xfs: short circuit xfs_growfs_data_private() if delta is zero (git-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2024-858,SUSE-SLE-Micro-5.5-2024-858,SUSE-SLE-Module-Basesystem-15-SP5-2024-858,SUSE-SLE-Module-Development-Tools-15-SP5-2024-858,SUSE-SLE-Module-Legacy-15-SP5-2024-858,SUSE-SLE-Module-Live-Patching-15-SP5-2024-858,SUSE-SLE-Product-HA-15-SP5-2024-858,SUSE-SLE-Product-WE-15-SP5-2024-858,openSUSE-SLE-15.5-2024-858",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_0858-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2024:0858-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20240858-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2024:0858-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html"
},
{
"category": "self",
"summary": "SUSE Bug 1194869",
"url": "https://bugzilla.suse.com/1194869"
},
{
"category": "self",
"summary": "SUSE Bug 1206453",
"url": "https://bugzilla.suse.com/1206453"
},
{
"category": "self",
"summary": "SUSE Bug 1209412",
"url": "https://bugzilla.suse.com/1209412"
},
{
"category": "self",
"summary": "SUSE Bug 1213456",
"url": "https://bugzilla.suse.com/1213456"
},
{
"category": "self",
"summary": "SUSE Bug 1216776",
"url": "https://bugzilla.suse.com/1216776"
},
{
"category": "self",
"summary": "SUSE Bug 1217927",
"url": "https://bugzilla.suse.com/1217927"
},
{
"category": "self",
"summary": "SUSE Bug 1218195",
"url": "https://bugzilla.suse.com/1218195"
},
{
"category": "self",
"summary": "SUSE Bug 1218216",
"url": "https://bugzilla.suse.com/1218216"
},
{
"category": "self",
"summary": "SUSE Bug 1218450",
"url": "https://bugzilla.suse.com/1218450"
},
{
"category": "self",
"summary": "SUSE Bug 1218527",
"url": "https://bugzilla.suse.com/1218527"
},
{
"category": "self",
"summary": "SUSE Bug 1218663",
"url": "https://bugzilla.suse.com/1218663"
},
{
"category": "self",
"summary": "SUSE Bug 1218915",
"url": "https://bugzilla.suse.com/1218915"
},
{
"category": "self",
"summary": "SUSE Bug 1219126",
"url": "https://bugzilla.suse.com/1219126"
},
{
"category": "self",
"summary": "SUSE Bug 1219127",
"url": "https://bugzilla.suse.com/1219127"
},
{
"category": "self",
"summary": "SUSE Bug 1219141",
"url": "https://bugzilla.suse.com/1219141"
},
{
"category": "self",
"summary": "SUSE Bug 1219146",
"url": "https://bugzilla.suse.com/1219146"
},
{
"category": "self",
"summary": "SUSE Bug 1219295",
"url": "https://bugzilla.suse.com/1219295"
},
{
"category": "self",
"summary": "SUSE Bug 1219443",
"url": "https://bugzilla.suse.com/1219443"
},
{
"category": "self",
"summary": "SUSE Bug 1219653",
"url": "https://bugzilla.suse.com/1219653"
},
{
"category": "self",
"summary": "SUSE Bug 1219827",
"url": "https://bugzilla.suse.com/1219827"
},
{
"category": "self",
"summary": "SUSE Bug 1219835",
"url": "https://bugzilla.suse.com/1219835"
},
{
"category": "self",
"summary": "SUSE Bug 1219839",
"url": "https://bugzilla.suse.com/1219839"
},
{
"category": "self",
"summary": "SUSE Bug 1219840",
"url": "https://bugzilla.suse.com/1219840"
},
{
"category": "self",
"summary": "SUSE Bug 1219934",
"url": "https://bugzilla.suse.com/1219934"
},
{
"category": "self",
"summary": "SUSE Bug 1220003",
"url": "https://bugzilla.suse.com/1220003"
},
{
"category": "self",
"summary": "SUSE Bug 1220009",
"url": "https://bugzilla.suse.com/1220009"
},
{
"category": "self",
"summary": "SUSE Bug 1220021",
"url": "https://bugzilla.suse.com/1220021"
},
{
"category": "self",
"summary": "SUSE Bug 1220030",
"url": "https://bugzilla.suse.com/1220030"
},
{
"category": "self",
"summary": "SUSE Bug 1220106",
"url": "https://bugzilla.suse.com/1220106"
},
{
"category": "self",
"summary": "SUSE Bug 1220140",
"url": "https://bugzilla.suse.com/1220140"
},
{
"category": "self",
"summary": "SUSE Bug 1220187",
"url": "https://bugzilla.suse.com/1220187"
},
{
"category": "self",
"summary": "SUSE Bug 1220238",
"url": "https://bugzilla.suse.com/1220238"
},
{
"category": "self",
"summary": "SUSE Bug 1220240",
"url": "https://bugzilla.suse.com/1220240"
},
{
"category": "self",
"summary": "SUSE Bug 1220241",
"url": "https://bugzilla.suse.com/1220241"
},
{
"category": "self",
"summary": "SUSE Bug 1220243",
"url": "https://bugzilla.suse.com/1220243"
},
{
"category": "self",
"summary": "SUSE Bug 1220250",
"url": "https://bugzilla.suse.com/1220250"
},
{
"category": "self",
"summary": "SUSE Bug 1220251",
"url": "https://bugzilla.suse.com/1220251"
},
{
"category": "self",
"summary": "SUSE Bug 1220253",
"url": "https://bugzilla.suse.com/1220253"
},
{
"category": "self",
"summary": "SUSE Bug 1220254",
"url": "https://bugzilla.suse.com/1220254"
},
{
"category": "self",
"summary": "SUSE Bug 1220255",
"url": "https://bugzilla.suse.com/1220255"
},
{
"category": "self",
"summary": "SUSE Bug 1220257",
"url": "https://bugzilla.suse.com/1220257"
},
{
"category": "self",
"summary": "SUSE Bug 1220267",
"url": "https://bugzilla.suse.com/1220267"
},
{
"category": "self",
"summary": "SUSE Bug 1220277",
"url": "https://bugzilla.suse.com/1220277"
},
{
"category": "self",
"summary": "SUSE Bug 1220317",
"url": "https://bugzilla.suse.com/1220317"
},
{
"category": "self",
"summary": "SUSE Bug 1220326",
"url": "https://bugzilla.suse.com/1220326"
},
{
"category": "self",
"summary": "SUSE Bug 1220328",
"url": "https://bugzilla.suse.com/1220328"
},
{
"category": "self",
"summary": "SUSE Bug 1220330",
"url": "https://bugzilla.suse.com/1220330"
},
{
"category": "self",
"summary": "SUSE Bug 1220335",
"url": "https://bugzilla.suse.com/1220335"
},
{
"category": "self",
"summary": "SUSE Bug 1220344",
"url": "https://bugzilla.suse.com/1220344"
},
{
"category": "self",
"summary": "SUSE Bug 1220348",
"url": "https://bugzilla.suse.com/1220348"
},
{
"category": "self",
"summary": "SUSE Bug 1220350",
"url": "https://bugzilla.suse.com/1220350"
},
{
"category": "self",
"summary": "SUSE Bug 1220364",
"url": "https://bugzilla.suse.com/1220364"
},
{
"category": "self",
"summary": "SUSE Bug 1220392",
"url": "https://bugzilla.suse.com/1220392"
},
{
"category": "self",
"summary": "SUSE Bug 1220393",
"url": "https://bugzilla.suse.com/1220393"
},
{
"category": "self",
"summary": "SUSE Bug 1220398",
"url": "https://bugzilla.suse.com/1220398"
},
{
"category": "self",
"summary": "SUSE Bug 1220409",
"url": "https://bugzilla.suse.com/1220409"
},
{
"category": "self",
"summary": "SUSE Bug 1220444",
"url": "https://bugzilla.suse.com/1220444"
},
{
"category": "self",
"summary": "SUSE Bug 1220457",
"url": "https://bugzilla.suse.com/1220457"
},
{
"category": "self",
"summary": "SUSE Bug 1220459",
"url": "https://bugzilla.suse.com/1220459"
},
{
"category": "self",
"summary": "SUSE Bug 1220649",
"url": "https://bugzilla.suse.com/1220649"
},
{
"category": "self",
"summary": "SUSE Bug 1220796",
"url": "https://bugzilla.suse.com/1220796"
},
{
"category": "self",
"summary": "SUSE Bug 1220825",
"url": "https://bugzilla.suse.com/1220825"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-25162 page",
"url": "https://www.suse.com/security/cve/CVE-2019-25162/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-46923 page",
"url": "https://www.suse.com/security/cve/CVE-2021-46923/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-46924 page",
"url": "https://www.suse.com/security/cve/CVE-2021-46924/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-46932 page",
"url": "https://www.suse.com/security/cve/CVE-2021-46932/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-28746 page",
"url": "https://www.suse.com/security/cve/CVE-2023-28746/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-5197 page",
"url": "https://www.suse.com/security/cve/CVE-2023-5197/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52340 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52340/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52429 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52429/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52439 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52439/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52443 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52443/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52445 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52445/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52447 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52447/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52448 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52448/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52449 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52449/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52451 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52451/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52452 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52452/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52456 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52456/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52457 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52457/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52463 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52463/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52464 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52464/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52475 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52475/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52478 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52478/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-6817 page",
"url": "https://www.suse.com/security/cve/CVE-2023-6817/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-0607 page",
"url": "https://www.suse.com/security/cve/CVE-2024-0607/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-1151 page",
"url": "https://www.suse.com/security/cve/CVE-2024-1151/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-23849 page",
"url": "https://www.suse.com/security/cve/CVE-2024-23849/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-23850 page",
"url": "https://www.suse.com/security/cve/CVE-2024-23850/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-23851 page",
"url": "https://www.suse.com/security/cve/CVE-2024-23851/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-25744 page",
"url": "https://www.suse.com/security/cve/CVE-2024-25744/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26585 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26585/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26586 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26589 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26589/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26591 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26591/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26593 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26593/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26595 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26595/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26598 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26598/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26602 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26602/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26603 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26603/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26622 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26622/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2024-03-13T00:09:40Z",
"generator": {
"date": "2024-03-13T00:09:40Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2024:0858-1",
"initial_release_date": "2024-03-13T00:09:40Z",
"revision_history": [
{
"date": "2024-03-13T00:09:40Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"product": {
"name": "cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"product_id": "cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"product": {
"name": "cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"product_id": "cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"product": {
"name": "dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"product_id": "dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"product": {
"name": "dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"product_id": "dlm-kmp-default-5.14.21-150500.55.52.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"product": {
"name": "dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"product_id": "dtb-allwinner-5.14.21-150500.55.52.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-altera-5.14.21-150500.55.52.1.aarch64",
"product": {
"name": "dtb-altera-5.14.21-150500.55.52.1.aarch64",
"product_id": "dtb-altera-5.14.21-150500.55.52.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"product": {
"name": "dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"product_id": "dtb-amazon-5.14.21-150500.55.52.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-amd-5.14.21-150500.55.52.1.aarch64",
"product": {
"name": "dtb-amd-5.14.21-150500.55.52.1.aarch64",
"product_id": "dtb-amd-5.14.21-150500.55.52.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"product": {
"name": "dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"product_id": "dtb-amlogic-5.14.21-150500.55.52.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-apm-5.14.21-150500.55.52.1.aarch64",
"product": {
"name": "dtb-apm-5.14.21-150500.55.52.1.aarch64",
"product_id": "dtb-apm-5.14.21-150500.55.52.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-apple-5.14.21-150500.55.52.1.aarch64",
"product": {
"name": "dtb-apple-5.14.21-150500.55.52.1.aarch64",
"product_id": "dtb-apple-5.14.21-150500.55.52.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-arm-5.14.21-150500.55.52.1.aarch64",
"product": {
"name": "dtb-arm-5.14.21-150500.55.52.1.aarch64",
"product_id": "dtb-arm-5.14.21-150500.55.52.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"product": {
"name": "dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"product_id": "dtb-broadcom-5.14.21-150500.55.52.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"product": {
"name": "dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"product_id": "dtb-cavium-5.14.21-150500.55.52.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"product": {
"name": "dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"product_id": "dtb-exynos-5.14.21-150500.55.52.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"product": {
"name": "dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"product_id": "dtb-freescale-5.14.21-150500.55.52.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"product": {
"name": "dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"product_id": "dtb-hisilicon-5.14.21-150500.55.52.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-lg-5.14.21-150500.55.52.1.aarch64",
"product": {
"name": "dtb-lg-5.14.21-150500.55.52.1.aarch64",
"product_id": "dtb-lg-5.14.21-150500.55.52.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"product": {
"name": "dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"product_id": "dtb-marvell-5.14.21-150500.55.52.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"product": {
"name": "dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"product_id": "dtb-mediatek-5.14.21-150500.55.52.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"product": {
"name": "dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"product_id": "dtb-nvidia-5.14.21-150500.55.52.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"product": {
"name": "dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"product_id": "dtb-qcom-5.14.21-150500.55.52.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"product": {
"name": "dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"product_id": "dtb-renesas-5.14.21-150500.55.52.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"product": {
"name": "dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"product_id": "dtb-rockchip-5.14.21-150500.55.52.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"product": {
"name": "dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"product_id": "dtb-socionext-5.14.21-150500.55.52.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"product": {
"name": "dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"product_id": "dtb-sprd-5.14.21-150500.55.52.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"product": {
"name": "dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"product_id": "dtb-xilinx-5.14.21-150500.55.52.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"product": {
"name": "gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"product_id": "gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"product": {
"name": "gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"product_id": "gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"product": {
"name": "kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"product_id": "kernel-64kb-5.14.21-150500.55.52.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"product": {
"name": "kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"product_id": "kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"product": {
"name": "kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"product_id": "kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"product": {
"name": "kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"product_id": "kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"product": {
"name": "kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"product_id": "kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-5.14.21-150500.55.52.1.aarch64",
"product": {
"name": "kernel-default-5.14.21-150500.55.52.1.aarch64",
"product_id": "kernel-default-5.14.21-150500.55.52.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"product": {
"name": "kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"product_id": "kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"product": {
"name": "kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"product_id": "kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"product": {
"name": "kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"product_id": "kernel-default-devel-5.14.21-150500.55.52.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"product": {
"name": "kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"product_id": "kernel-default-extra-5.14.21-150500.55.52.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"product": {
"name": "kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"product_id": "kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"product": {
"name": "kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"product_id": "kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"product": {
"name": "kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"product_id": "kernel-default-optional-5.14.21-150500.55.52.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"product": {
"name": "kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"product_id": "kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"product": {
"name": "kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"product_id": "kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"product": {
"name": "kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"product_id": "kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"product": {
"name": "kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"product_id": "kernel-obs-build-5.14.21-150500.55.52.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"product": {
"name": "kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"product_id": "kernel-obs-qa-5.14.21-150500.55.52.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.14.21-150500.55.52.1.aarch64",
"product": {
"name": "kernel-syms-5.14.21-150500.55.52.1.aarch64",
"product_id": "kernel-syms-5.14.21-150500.55.52.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"product": {
"name": "kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"product_id": "kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"product": {
"name": "kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"product_id": "kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"product": {
"name": "ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"product_id": "ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"product": {
"name": "ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"product_id": "ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"product": {
"name": "reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"product_id": "reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"product": {
"name": "reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"product_id": "reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-5.14.21-150500.55.52.1.noarch",
"product": {
"name": "kernel-devel-5.14.21-150500.55.52.1.noarch",
"product_id": "kernel-devel-5.14.21-150500.55.52.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-5.14.21-150500.55.52.1.noarch",
"product": {
"name": "kernel-docs-5.14.21-150500.55.52.1.noarch",
"product_id": "kernel-docs-5.14.21-150500.55.52.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"product": {
"name": "kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"product_id": "kernel-docs-html-5.14.21-150500.55.52.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-5.14.21-150500.55.52.1.noarch",
"product": {
"name": "kernel-macros-5.14.21-150500.55.52.1.noarch",
"product_id": "kernel-macros-5.14.21-150500.55.52.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-5.14.21-150500.55.52.1.noarch",
"product": {
"name": "kernel-source-5.14.21-150500.55.52.1.noarch",
"product_id": "kernel-source-5.14.21-150500.55.52.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"product": {
"name": "kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"product_id": "kernel-source-vanilla-5.14.21-150500.55.52.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"product_id": "cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"product": {
"name": "dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"product_id": "dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"product_id": "gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"product": {
"name": "kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"product_id": "kernel-debug-5.14.21-150500.55.52.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"product": {
"name": "kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"product_id": "kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"product": {
"name": "kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"product_id": "kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-5.14.21-150500.55.52.1.ppc64le",
"product": {
"name": "kernel-default-5.14.21-150500.55.52.1.ppc64le",
"product_id": "kernel-default-5.14.21-150500.55.52.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"product": {
"name": "kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"product_id": "kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"product": {
"name": "kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"product_id": "kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"product": {
"name": "kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"product_id": "kernel-default-devel-5.14.21-150500.55.52.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"product": {
"name": "kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"product_id": "kernel-default-extra-5.14.21-150500.55.52.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"product_id": "kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"product_id": "kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"product": {
"name": "kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"product_id": "kernel-default-optional-5.14.21-150500.55.52.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"product": {
"name": "kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"product_id": "kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"product": {
"name": "kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"product_id": "kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"product": {
"name": "kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"product_id": "kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"product": {
"name": "kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"product_id": "kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"product": {
"name": "kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"product_id": "kernel-obs-build-5.14.21-150500.55.52.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"product": {
"name": "kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"product_id": "kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"product": {
"name": "kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"product_id": "kernel-syms-5.14.21-150500.55.52.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"product": {
"name": "kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"product_id": "kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"product_id": "ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"product": {
"name": "reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"product_id": "reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"product": {
"name": "cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"product_id": "cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"product": {
"name": "dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"product_id": "dlm-kmp-default-5.14.21-150500.55.52.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"product": {
"name": "gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"product_id": "gfs2-kmp-default-5.14.21-150500.55.52.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-5.14.21-150500.55.52.1.s390x",
"product": {
"name": "kernel-default-5.14.21-150500.55.52.1.s390x",
"product_id": "kernel-default-5.14.21-150500.55.52.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"product": {
"name": "kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"product_id": "kernel-default-devel-5.14.21-150500.55.52.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"product": {
"name": "kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"product_id": "kernel-default-extra-5.14.21-150500.55.52.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"product": {
"name": "kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"product_id": "kernel-default-livepatch-5.14.21-150500.55.52.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"product": {
"name": "kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"product_id": "kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"product": {
"name": "kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"product_id": "kernel-default-optional-5.14.21-150500.55.52.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"product": {
"name": "kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"product_id": "kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"product": {
"name": "kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"product_id": "kernel-obs-build-5.14.21-150500.55.52.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"product": {
"name": "kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"product_id": "kernel-obs-qa-5.14.21-150500.55.52.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.14.21-150500.55.52.1.s390x",
"product": {
"name": "kernel-syms-5.14.21-150500.55.52.1.s390x",
"product_id": "kernel-syms-5.14.21-150500.55.52.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"product": {
"name": "kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"product_id": "kernel-zfcpdump-5.14.21-150500.55.52.1.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"product": {
"name": "kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"product_id": "kselftests-kmp-default-5.14.21-150500.55.52.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"product": {
"name": "ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"product_id": "ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"product": {
"name": "reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"product_id": "reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"product_id": "cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"product": {
"name": "dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"product_id": "dlm-kmp-default-5.14.21-150500.55.52.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"product": {
"name": "gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"product_id": "gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-5.14.21-150500.55.52.1.x86_64",
"product": {
"name": "kernel-debug-5.14.21-150500.55.52.1.x86_64",
"product_id": "kernel-debug-5.14.21-150500.55.52.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"product": {
"name": "kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"product_id": "kernel-debug-devel-5.14.21-150500.55.52.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"product": {
"name": "kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"product_id": "kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"product": {
"name": "kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"product_id": "kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-5.14.21-150500.55.52.1.x86_64",
"product": {
"name": "kernel-default-5.14.21-150500.55.52.1.x86_64",
"product_id": "kernel-default-5.14.21-150500.55.52.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"product": {
"name": "kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"product_id": "kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"product": {
"name": "kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"product_id": "kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"product": {
"name": "kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"product_id": "kernel-default-devel-5.14.21-150500.55.52.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"product": {
"name": "kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"product_id": "kernel-default-extra-5.14.21-150500.55.52.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"product": {
"name": "kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"product_id": "kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"product": {
"name": "kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"product_id": "kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"product": {
"name": "kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"product_id": "kernel-default-optional-5.14.21-150500.55.52.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"product": {
"name": "kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"product_id": "kernel-default-vdso-5.14.21-150500.55.52.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"product": {
"name": "kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"product_id": "kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"product_id": "kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"product": {
"name": "kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"product_id": "kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"product": {
"name": "kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"product_id": "kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"product": {
"name": "kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"product_id": "kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"product": {
"name": "kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"product_id": "kernel-obs-build-5.14.21-150500.55.52.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"product": {
"name": "kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"product_id": "kernel-obs-qa-5.14.21-150500.55.52.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.14.21-150500.55.52.1.x86_64",
"product": {
"name": "kernel-syms-5.14.21-150500.55.52.1.x86_64",
"product_id": "kernel-syms-5.14.21-150500.55.52.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"product": {
"name": "kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"product_id": "kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"product_id": "ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"product": {
"name": "reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"product_id": "reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.5",
"product": {
"name": "SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-micro:5.5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-development-tools:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Legacy 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Module for Legacy 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-legacy:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 15 SP5",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 15 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Workstation Extension 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Workstation Extension 15 SP5",
"product_id": "SUSE Linux Enterprise Workstation Extension 15 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-we:15:sp5"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.5",
"product": {
"name": "openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.14.21-150500.55.52.1.aarch64 as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64"
},
"product_reference": "kernel-default-5.14.21-150500.55.52.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.14.21-150500.55.52.1.s390x as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x"
},
"product_reference": "kernel-default-5.14.21-150500.55.52.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.14.21-150500.55.52.1.x86_64 as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64"
},
"product_reference": "kernel-default-5.14.21-150500.55.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64 as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64"
},
"product_reference": "kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64 as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64"
},
"product_reference": "kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-5.14.21-150500.55.52.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64"
},
"product_reference": "kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64"
},
"product_reference": "kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.14.21-150500.55.52.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64"
},
"product_reference": "kernel-default-5.14.21-150500.55.52.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.14.21-150500.55.52.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le"
},
"product_reference": "kernel-default-5.14.21-150500.55.52.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.14.21-150500.55.52.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x"
},
"product_reference": "kernel-default-5.14.21-150500.55.52.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.14.21-150500.55.52.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64"
},
"product_reference": "kernel-default-5.14.21-150500.55.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64"
},
"product_reference": "kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le"
},
"product_reference": "kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64"
},
"product_reference": "kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.14.21-150500.55.52.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64"
},
"product_reference": "kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.14.21-150500.55.52.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le"
},
"product_reference": "kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.14.21-150500.55.52.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x"
},
"product_reference": "kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.14.21-150500.55.52.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64"
},
"product_reference": "kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.14.21-150500.55.52.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch"
},
"product_reference": "kernel-devel-5.14.21-150500.55.52.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.14.21-150500.55.52.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch"
},
"product_reference": "kernel-macros-5.14.21-150500.55.52.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-5.14.21-150500.55.52.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x"
},
"product_reference": "kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-5.14.21-150500.55.52.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch"
},
"product_reference": "kernel-docs-5.14.21-150500.55.52.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.14.21-150500.55.52.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64"
},
"product_reference": "kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.14.21-150500.55.52.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le"
},
"product_reference": "kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.14.21-150500.55.52.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x"
},
"product_reference": "kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.14.21-150500.55.52.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64"
},
"product_reference": "kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.14.21-150500.55.52.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch"
},
"product_reference": "kernel-source-5.14.21-150500.55.52.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.14.21-150500.55.52.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64"
},
"product_reference": "kernel-syms-5.14.21-150500.55.52.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.14.21-150500.55.52.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le"
},
"product_reference": "kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.14.21-150500.55.52.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x"
},
"product_reference": "kernel-syms-5.14.21-150500.55.52.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.14.21-150500.55.52.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64"
},
"product_reference": "kernel-syms-5.14.21-150500.55.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64"
},
"product_reference": "reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le"
},
"product_reference": "reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x"
},
"product_reference": "reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.14.21-150500.55.52.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x"
},
"product_reference": "kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64"
},
"product_reference": "kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x"
},
"product_reference": "kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64"
},
"product_reference": "kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x"
},
"product_reference": "kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64"
},
"product_reference": "kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64"
},
"product_reference": "cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x"
},
"product_reference": "cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.14.21-150500.55.52.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64"
},
"product_reference": "dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le"
},
"product_reference": "dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.14.21-150500.55.52.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x"
},
"product_reference": "dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.14.21-150500.55.52.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64"
},
"product_reference": "dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64"
},
"product_reference": "gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.14.21-150500.55.52.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x"
},
"product_reference": "gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64"
},
"product_reference": "gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64"
},
"product_reference": "ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x"
},
"product_reference": "ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-5.14.21-150500.55.52.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP5",
"product_id": "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64"
},
"product_reference": "kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64"
},
"product_reference": "cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64"
},
"product_reference": "cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x"
},
"product_reference": "cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64"
},
"product_reference": "dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.14.21-150500.55.52.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64"
},
"product_reference": "dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le"
},
"product_reference": "dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.14.21-150500.55.52.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x"
},
"product_reference": "dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.14.21-150500.55.52.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64"
},
"product_reference": "dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-allwinner-5.14.21-150500.55.52.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64"
},
"product_reference": "dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-altera-5.14.21-150500.55.52.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64"
},
"product_reference": "dtb-altera-5.14.21-150500.55.52.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-amazon-5.14.21-150500.55.52.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64"
},
"product_reference": "dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-amd-5.14.21-150500.55.52.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64"
},
"product_reference": "dtb-amd-5.14.21-150500.55.52.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-amlogic-5.14.21-150500.55.52.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64"
},
"product_reference": "dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-apm-5.14.21-150500.55.52.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64"
},
"product_reference": "dtb-apm-5.14.21-150500.55.52.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-apple-5.14.21-150500.55.52.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64"
},
"product_reference": "dtb-apple-5.14.21-150500.55.52.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-arm-5.14.21-150500.55.52.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64"
},
"product_reference": "dtb-arm-5.14.21-150500.55.52.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-broadcom-5.14.21-150500.55.52.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64"
},
"product_reference": "dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-cavium-5.14.21-150500.55.52.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64"
},
"product_reference": "dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-exynos-5.14.21-150500.55.52.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64"
},
"product_reference": "dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-freescale-5.14.21-150500.55.52.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64"
},
"product_reference": "dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-hisilicon-5.14.21-150500.55.52.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64"
},
"product_reference": "dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-lg-5.14.21-150500.55.52.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64"
},
"product_reference": "dtb-lg-5.14.21-150500.55.52.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-marvell-5.14.21-150500.55.52.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64"
},
"product_reference": "dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-mediatek-5.14.21-150500.55.52.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64"
},
"product_reference": "dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-nvidia-5.14.21-150500.55.52.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64"
},
"product_reference": "dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-qcom-5.14.21-150500.55.52.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64"
},
"product_reference": "dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-renesas-5.14.21-150500.55.52.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64"
},
"product_reference": "dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-rockchip-5.14.21-150500.55.52.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64"
},
"product_reference": "dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-socionext-5.14.21-150500.55.52.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64"
},
"product_reference": "dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-sprd-5.14.21-150500.55.52.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64"
},
"product_reference": "dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-xilinx-5.14.21-150500.55.52.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64"
},
"product_reference": "dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64"
},
"product_reference": "gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64"
},
"product_reference": "gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.14.21-150500.55.52.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x"
},
"product_reference": "gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64"
},
"product_reference": "gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-5.14.21-150500.55.52.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64"
},
"product_reference": "kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64"
},
"product_reference": "kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64"
},
"product_reference": "kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64"
},
"product_reference": "kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64"
},
"product_reference": "kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-5.14.21-150500.55.52.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le"
},
"product_reference": "kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-5.14.21-150500.55.52.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64"
},
"product_reference": "kernel-debug-5.14.21-150500.55.52.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le"
},
"product_reference": "kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-5.14.21-150500.55.52.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64"
},
"product_reference": "kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le"
},
"product_reference": "kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64"
},
"product_reference": "kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64"
},
"product_reference": "kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.14.21-150500.55.52.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64"
},
"product_reference": "kernel-default-5.14.21-150500.55.52.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.14.21-150500.55.52.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le"
},
"product_reference": "kernel-default-5.14.21-150500.55.52.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.14.21-150500.55.52.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x"
},
"product_reference": "kernel-default-5.14.21-150500.55.52.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.14.21-150500.55.52.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64"
},
"product_reference": "kernel-default-5.14.21-150500.55.52.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64"
},
"product_reference": "kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le"
},
"product_reference": "kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64"
},
"product_reference": "kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64"
},
"product_reference": "kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le"
},
"product_reference": "kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64"
},
"product_reference": "kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.14.21-150500.55.52.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64"
},
"product_reference": "kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.14.21-150500.55.52.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le"
},
"product_reference": "kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.14.21-150500.55.52.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x"
},
"product_reference": "kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.14.21-150500.55.52.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64"
},
"product_reference": "kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-5.14.21-150500.55.52.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64"
},
"product_reference": "kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-5.14.21-150500.55.52.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le"
},
"product_reference": "kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-5.14.21-150500.55.52.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x"
},
"product_reference": "kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-5.14.21-150500.55.52.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64"
},
"product_reference": "kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64"
},
"product_reference": "kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.14.21-150500.55.52.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x"
},
"product_reference": "kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64"
},
"product_reference": "kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64"
},
"product_reference": "kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x"
},
"product_reference": "kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64"
},
"product_reference": "kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-optional-5.14.21-150500.55.52.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64"
},
"product_reference": "kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-optional-5.14.21-150500.55.52.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le"
},
"product_reference": "kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-optional-5.14.21-150500.55.52.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x"
},
"product_reference": "kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-optional-5.14.21-150500.55.52.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64"
},
"product_reference": "kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-vdso-5.14.21-150500.55.52.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64"
},
"product_reference": "kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.14.21-150500.55.52.1.noarch as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch"
},
"product_reference": "kernel-devel-5.14.21-150500.55.52.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-5.14.21-150500.55.52.1.noarch as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch"
},
"product_reference": "kernel-docs-5.14.21-150500.55.52.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-html-5.14.21-150500.55.52.1.noarch as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch"
},
"product_reference": "kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64"
},
"product_reference": "kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le"
},
"product_reference": "kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64"
},
"product_reference": "kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64"
},
"product_reference": "kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le"
},
"product_reference": "kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64"
},
"product_reference": "kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64"
},
"product_reference": "kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le"
},
"product_reference": "kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64"
},
"product_reference": "kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64"
},
"product_reference": "kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.14.21-150500.55.52.1.noarch as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch"
},
"product_reference": "kernel-macros-5.14.21-150500.55.52.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.14.21-150500.55.52.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64"
},
"product_reference": "kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.14.21-150500.55.52.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le"
},
"product_reference": "kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.14.21-150500.55.52.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x"
},
"product_reference": "kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.14.21-150500.55.52.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64"
},
"product_reference": "kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-5.14.21-150500.55.52.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64"
},
"product_reference": "kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le"
},
"product_reference": "kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-5.14.21-150500.55.52.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x"
},
"product_reference": "kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-5.14.21-150500.55.52.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64"
},
"product_reference": "kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.14.21-150500.55.52.1.noarch as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch"
},
"product_reference": "kernel-source-5.14.21-150500.55.52.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-vanilla-5.14.21-150500.55.52.1.noarch as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch"
},
"product_reference": "kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.14.21-150500.55.52.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64"
},
"product_reference": "kernel-syms-5.14.21-150500.55.52.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.14.21-150500.55.52.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le"
},
"product_reference": "kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.14.21-150500.55.52.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x"
},
"product_reference": "kernel-syms-5.14.21-150500.55.52.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.14.21-150500.55.52.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64"
},
"product_reference": "kernel-syms-5.14.21-150500.55.52.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-5.14.21-150500.55.52.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x"
},
"product_reference": "kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64"
},
"product_reference": "kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64"
},
"product_reference": "kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le"
},
"product_reference": "kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-default-5.14.21-150500.55.52.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x"
},
"product_reference": "kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64"
},
"product_reference": "kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64"
},
"product_reference": "ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64"
},
"product_reference": "ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x"
},
"product_reference": "ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64"
},
"product_reference": "reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64"
},
"product_reference": "reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le"
},
"product_reference": "reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x"
},
"product_reference": "reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-25162",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-25162"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ni2c: Fix a potential use after free\n\nFree the adap structure only after we are done using it.\nThis patch just moves the put_device() down a bit to avoid the\nuse after free.\n\n[wsa: added comment to the code, added Fixes tag]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-25162",
"url": "https://www.suse.com/security/cve/CVE-2019-25162"
},
{
"category": "external",
"summary": "SUSE Bug 1220409 for CVE-2019-25162",
"url": "https://bugzilla.suse.com/1220409"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-13T00:09:40Z",
"details": "moderate"
}
],
"title": "CVE-2019-25162"
},
{
"cve": "CVE-2021-46923",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-46923"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs/mount_setattr: always cleanup mount_kattr\n\nMake sure that finish_mount_kattr() is called after mount_kattr was\nsuccesfully built in both the success and failure case to prevent\nleaking any references we took when we built it. We returned early if\npath lookup failed thereby risking to leak an additional reference we\ntook when building mount_kattr when an idmapped mount was requested.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-46923",
"url": "https://www.suse.com/security/cve/CVE-2021-46923"
},
{
"category": "external",
"summary": "SUSE Bug 1220457 for CVE-2021-46923",
"url": "https://bugzilla.suse.com/1220457"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-13T00:09:40Z",
"details": "low"
}
],
"title": "CVE-2021-46923"
},
{
"cve": "CVE-2021-46924",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-46924"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFC: st21nfca: Fix memory leak in device probe and remove\n\n\u0027phy-\u003epending_skb\u0027 is alloced when device probe, but forgot to free\nin the error handling path and remove path, this cause memory leak\nas follows:\n\nunreferenced object 0xffff88800bc06800 (size 512):\n comm \"8\", pid 11775, jiffies 4295159829 (age 9.032s)\n hex dump (first 32 bytes):\n 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\n 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\n backtrace:\n [\u003c00000000d66c09ce\u003e] __kmalloc_node_track_caller+0x1ed/0x450\n [\u003c00000000c93382b3\u003e] kmalloc_reserve+0x37/0xd0\n [\u003c000000005fea522c\u003e] __alloc_skb+0x124/0x380\n [\u003c0000000019f29f9a\u003e] st21nfca_hci_i2c_probe+0x170/0x8f2\n\nFix it by freeing \u0027pending_skb\u0027 in error and remove.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-46924",
"url": "https://www.suse.com/security/cve/CVE-2021-46924"
},
{
"category": "external",
"summary": "SUSE Bug 1220459 for CVE-2021-46924",
"url": "https://bugzilla.suse.com/1220459"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-13T00:09:40Z",
"details": "moderate"
}
],
"title": "CVE-2021-46924"
},
{
"cve": "CVE-2021-46932",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-46932"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nInput: appletouch - initialize work before device registration\n\nSyzbot has reported warning in __flush_work(). This warning is caused by\nwork-\u003efunc == NULL, which means missing work initialization.\n\nThis may happen, since input_dev-\u003eclose() calls\ncancel_work_sync(\u0026dev-\u003ework), but dev-\u003ework initalization happens _after_\ninput_register_device() call.\n\nSo this patch moves dev-\u003ework initialization before registering input\ndevice",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-46932",
"url": "https://www.suse.com/security/cve/CVE-2021-46932"
},
{
"category": "external",
"summary": "SUSE Bug 1220444 for CVE-2021-46932",
"url": "https://bugzilla.suse.com/1220444"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-13T00:09:40Z",
"details": "moderate"
}
],
"title": "CVE-2021-46932"
},
{
"cve": "CVE-2023-28746",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-28746"
}
],
"notes": [
{
"category": "general",
"text": "Information exposure through microarchitectural state after transient execution from some register files for some Intel(R) Atom(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-28746",
"url": "https://www.suse.com/security/cve/CVE-2023-28746"
},
{
"category": "external",
"summary": "SUSE Bug 1213456 for CVE-2023-28746",
"url": "https://bugzilla.suse.com/1213456"
},
{
"category": "external",
"summary": "SUSE Bug 1221323 for CVE-2023-28746",
"url": "https://bugzilla.suse.com/1221323"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-13T00:09:40Z",
"details": "moderate"
}
],
"title": "CVE-2023-28746"
},
{
"cve": "CVE-2023-5197",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-5197"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free vulnerability in the Linux kernel\u0027s netfilter: nf_tables component can be exploited to achieve local privilege escalation.\n\nAddition and removal of rules from chain bindings within the same transaction causes leads to use-after-free.\n\nWe recommend upgrading past commit f15f29fd4779be8a418b66e9d52979bb6d6c2325.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-5197",
"url": "https://www.suse.com/security/cve/CVE-2023-5197"
},
{
"category": "external",
"summary": "SUSE Bug 1218216 for CVE-2023-5197",
"url": "https://bugzilla.suse.com/1218216"
},
{
"category": "external",
"summary": "SUSE Bug 1245974 for CVE-2023-5197",
"url": "https://bugzilla.suse.com/1245974"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-13T00:09:40Z",
"details": "important"
}
],
"title": "CVE-2023-5197"
},
{
"cve": "CVE-2023-52340",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52340"
}
],
"notes": [
{
"category": "general",
"text": "The IPv6 implementation in the Linux kernel before 6.3 has a net/ipv6/route.c max_size threshold that can be consumed easily, e.g., leading to a denial of service (network is unreachable errors) when IPv6 packets are sent in a loop via a raw socket.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52340",
"url": "https://www.suse.com/security/cve/CVE-2023-52340"
},
{
"category": "external",
"summary": "SUSE Bug 1219295 for CVE-2023-52340",
"url": "https://bugzilla.suse.com/1219295"
},
{
"category": "external",
"summary": "SUSE Bug 1219296 for CVE-2023-52340",
"url": "https://bugzilla.suse.com/1219296"
},
{
"category": "external",
"summary": "SUSE Bug 1224298 for CVE-2023-52340",
"url": "https://bugzilla.suse.com/1224298"
},
{
"category": "external",
"summary": "SUSE Bug 1224878 for CVE-2023-52340",
"url": "https://bugzilla.suse.com/1224878"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-13T00:09:40Z",
"details": "important"
}
],
"title": "CVE-2023-52340"
},
{
"cve": "CVE-2023-52429",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52429"
}
],
"notes": [
{
"category": "general",
"text": "dm_table_create in drivers/md/dm-table.c in the Linux kernel through 6.7.4 can attempt to (in alloc_targets) allocate more than INT_MAX bytes, and crash, because of a missing check for struct dm_ioctl.target_count.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52429",
"url": "https://www.suse.com/security/cve/CVE-2023-52429"
},
{
"category": "external",
"summary": "SUSE Bug 1219827 for CVE-2023-52429",
"url": "https://bugzilla.suse.com/1219827"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-13T00:09:40Z",
"details": "moderate"
}
],
"title": "CVE-2023-52429"
},
{
"cve": "CVE-2023-52439",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52439"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nuio: Fix use-after-free in uio_open\n\ncore-1\t\t\t\tcore-2\n-------------------------------------------------------\nuio_unregister_device\t\tuio_open\n\t\t\t\tidev = idr_find()\ndevice_unregister(\u0026idev-\u003edev)\nput_device(\u0026idev-\u003edev)\nuio_device_release\n\t\t\t\tget_device(\u0026idev-\u003edev)\nkfree(idev)\nuio_free_minor(minor)\n\t\t\t\tuio_release\n\t\t\t\tput_device(\u0026idev-\u003edev)\n\t\t\t\tkfree(idev)\n-------------------------------------------------------\n\nIn the core-1 uio_unregister_device(), the device_unregister will kfree\nidev when the idev-\u003edev kobject ref is 1. But after core-1\ndevice_unregister, put_device and before doing kfree, the core-2 may\nget_device. Then:\n1. After core-1 kfree idev, the core-2 will do use-after-free for idev.\n2. When core-2 do uio_release and put_device, the idev will be double\n freed.\n\nTo address this issue, we can get idev atomic \u0026 inc idev reference with\nminor_lock.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52439",
"url": "https://www.suse.com/security/cve/CVE-2023-52439"
},
{
"category": "external",
"summary": "SUSE Bug 1220140 for CVE-2023-52439",
"url": "https://bugzilla.suse.com/1220140"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-13T00:09:40Z",
"details": "moderate"
}
],
"title": "CVE-2023-52439"
},
{
"cve": "CVE-2023-52443",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52443"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\napparmor: avoid crash when parsed profile name is empty\n\nWhen processing a packed profile in unpack_profile() described like\n\n \"profile :ns::samba-dcerpcd /usr/lib*/samba/{,samba/}samba-dcerpcd {...}\"\n\na string \":samba-dcerpcd\" is unpacked as a fully-qualified name and then\npassed to aa_splitn_fqname().\n\naa_splitn_fqname() treats \":samba-dcerpcd\" as only containing a namespace.\nThus it returns NULL for tmpname, meanwhile tmpns is non-NULL. Later\naa_alloc_profile() crashes as the new profile name is NULL now.\n\ngeneral protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN NOPTI\nKASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007]\nCPU: 6 PID: 1657 Comm: apparmor_parser Not tainted 6.7.0-rc2-dirty #16\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.2-3-gd478f380-rebuilt.opensuse.org 04/01/2014\nRIP: 0010:strlen+0x1e/0xa0\nCall Trace:\n \u003cTASK\u003e\n ? strlen+0x1e/0xa0\n aa_policy_init+0x1bb/0x230\n aa_alloc_profile+0xb1/0x480\n unpack_profile+0x3bc/0x4960\n aa_unpack+0x309/0x15e0\n aa_replace_profiles+0x213/0x33c0\n policy_update+0x261/0x370\n profile_replace+0x20e/0x2a0\n vfs_write+0x2af/0xe00\n ksys_write+0x126/0x250\n do_syscall_64+0x46/0xf0\n entry_SYSCALL_64_after_hwframe+0x6e/0x76\n \u003c/TASK\u003e\n---[ end trace 0000000000000000 ]---\nRIP: 0010:strlen+0x1e/0xa0\n\nIt seems such behaviour of aa_splitn_fqname() is expected and checked in\nother places where it is called (e.g. aa_remove_profiles). Well, there\nis an explicit comment \"a ns name without a following profile is allowed\"\ninside.\n\nAFAICS, nothing can prevent unpacked \"name\" to be in form like\n\":samba-dcerpcd\" - it is passed from userspace.\n\nDeny the whole profile set replacement in such case and inform user with\nEPROTO and an explaining message.\n\nFound by Linux Verification Center (linuxtesting.org).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52443",
"url": "https://www.suse.com/security/cve/CVE-2023-52443"
},
{
"category": "external",
"summary": "SUSE Bug 1220240 for CVE-2023-52443",
"url": "https://bugzilla.suse.com/1220240"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-13T00:09:40Z",
"details": "moderate"
}
],
"title": "CVE-2023-52443"
},
{
"cve": "CVE-2023-52445",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52445"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: pvrusb2: fix use after free on context disconnection\n\nUpon module load, a kthread is created targeting the\npvr2_context_thread_func function, which may call pvr2_context_destroy\nand thus call kfree() on the context object. However, that might happen\nbefore the usb hub_event handler is able to notify the driver. This\npatch adds a sanity check before the invalid read reported by syzbot,\nwithin the context disconnection call stack.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52445",
"url": "https://www.suse.com/security/cve/CVE-2023-52445"
},
{
"category": "external",
"summary": "SUSE Bug 1220241 for CVE-2023-52445",
"url": "https://bugzilla.suse.com/1220241"
},
{
"category": "external",
"summary": "SUSE Bug 1220315 for CVE-2023-52445",
"url": "https://bugzilla.suse.com/1220315"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-13T00:09:40Z",
"details": "moderate"
}
],
"title": "CVE-2023-52445"
},
{
"cve": "CVE-2023-52447",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52447"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Defer the free of inner map when necessary\n\nWhen updating or deleting an inner map in map array or map htab, the map\nmay still be accessed by non-sleepable program or sleepable program.\nHowever bpf_map_fd_put_ptr() decreases the ref-counter of the inner map\ndirectly through bpf_map_put(), if the ref-counter is the last one\n(which is true for most cases), the inner map will be freed by\nops-\u003emap_free() in a kworker. But for now, most .map_free() callbacks\ndon\u0027t use synchronize_rcu() or its variants to wait for the elapse of a\nRCU grace period, so after the invocation of ops-\u003emap_free completes,\nthe bpf program which is accessing the inner map may incur\nuse-after-free problem.\n\nFix the free of inner map by invoking bpf_map_free_deferred() after both\none RCU grace period and one tasks trace RCU grace period if the inner\nmap has been removed from the outer map before. The deferment is\naccomplished by using call_rcu() or call_rcu_tasks_trace() when\nreleasing the last ref-counter of bpf map. The newly-added rcu_head\nfield in bpf_map shares the same storage space with work field to\nreduce the size of bpf_map.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52447",
"url": "https://www.suse.com/security/cve/CVE-2023-52447"
},
{
"category": "external",
"summary": "SUSE Bug 1220251 for CVE-2023-52447",
"url": "https://bugzilla.suse.com/1220251"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-13T00:09:40Z",
"details": "moderate"
}
],
"title": "CVE-2023-52447"
},
{
"cve": "CVE-2023-52448",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52448"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ngfs2: Fix kernel NULL pointer dereference in gfs2_rgrp_dump\n\nSyzkaller has reported a NULL pointer dereference when accessing\nrgd-\u003erd_rgl in gfs2_rgrp_dump(). This can happen when creating\nrgd-\u003erd_gl fails in read_rindex_entry(). Add a NULL pointer check in\ngfs2_rgrp_dump() to prevent that.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52448",
"url": "https://www.suse.com/security/cve/CVE-2023-52448"
},
{
"category": "external",
"summary": "SUSE Bug 1220253 for CVE-2023-52448",
"url": "https://bugzilla.suse.com/1220253"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-13T00:09:40Z",
"details": "moderate"
}
],
"title": "CVE-2023-52448"
},
{
"cve": "CVE-2023-52449",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52449"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmtd: Fix gluebi NULL pointer dereference caused by ftl notifier\n\nIf both ftl.ko and gluebi.ko are loaded, the notifier of ftl\ntriggers NULL pointer dereference when trying to access\n\u0027gluebi-\u003edesc\u0027 in gluebi_read().\n\nubi_gluebi_init\n ubi_register_volume_notifier\n ubi_enumerate_volumes\n ubi_notify_all\n gluebi_notify nb-\u003enotifier_call()\n gluebi_create\n mtd_device_register\n mtd_device_parse_register\n add_mtd_device\n blktrans_notify_add not-\u003eadd()\n ftl_add_mtd tr-\u003eadd_mtd()\n scan_header\n mtd_read\n mtd_read_oob\n mtd_read_oob_std\n gluebi_read mtd-\u003eread()\n gluebi-\u003edesc - NULL\n\nDetailed reproduction information available at the Link [1],\n\nIn the normal case, obtain gluebi-\u003edesc in the gluebi_get_device(),\nand access gluebi-\u003edesc in the gluebi_read(). However,\ngluebi_get_device() is not executed in advance in the\nftl_add_mtd() process, which leads to NULL pointer dereference.\n\nThe solution for the gluebi module is to run jffs2 on the UBI\nvolume without considering working with ftl or mtdblock [2].\nTherefore, this problem can be avoided by preventing gluebi from\ncreating the mtdblock device after creating mtd partition of the\ntype MTD_UBIVOLUME.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52449",
"url": "https://www.suse.com/security/cve/CVE-2023-52449"
},
{
"category": "external",
"summary": "SUSE Bug 1220238 for CVE-2023-52449",
"url": "https://bugzilla.suse.com/1220238"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-13T00:09:40Z",
"details": "moderate"
}
],
"title": "CVE-2023-52449"
},
{
"cve": "CVE-2023-52451",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52451"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/pseries/memhp: Fix access beyond end of drmem array\n\ndlpar_memory_remove_by_index() may access beyond the bounds of the\ndrmem lmb array when the LMB lookup fails to match an entry with the\ngiven DRC index. When the search fails, the cursor is left pointing to\n\u0026drmem_info-\u003elmbs[drmem_info-\u003en_lmbs], which is one element past the\nlast valid entry in the array. The debug message at the end of the\nfunction then dereferences this pointer:\n\n pr_debug(\"Failed to hot-remove memory at %llx\\n\",\n lmb-\u003ebase_addr);\n\nThis was found by inspection and confirmed with KASAN:\n\n pseries-hotplug-mem: Attempting to hot-remove LMB, drc index 1234\n ==================================================================\n BUG: KASAN: slab-out-of-bounds in dlpar_memory+0x298/0x1658\n Read of size 8 at addr c000000364e97fd0 by task bash/949\n\n dump_stack_lvl+0xa4/0xfc (unreliable)\n print_report+0x214/0x63c\n kasan_report+0x140/0x2e0\n __asan_load8+0xa8/0xe0\n dlpar_memory+0x298/0x1658\n handle_dlpar_errorlog+0x130/0x1d0\n dlpar_store+0x18c/0x3e0\n kobj_attr_store+0x68/0xa0\n sysfs_kf_write+0xc4/0x110\n kernfs_fop_write_iter+0x26c/0x390\n vfs_write+0x2d4/0x4e0\n ksys_write+0xac/0x1a0\n system_call_exception+0x268/0x530\n system_call_vectored_common+0x15c/0x2ec\n\n Allocated by task 1:\n kasan_save_stack+0x48/0x80\n kasan_set_track+0x34/0x50\n kasan_save_alloc_info+0x34/0x50\n __kasan_kmalloc+0xd0/0x120\n __kmalloc+0x8c/0x320\n kmalloc_array.constprop.0+0x48/0x5c\n drmem_init+0x2a0/0x41c\n do_one_initcall+0xe0/0x5c0\n kernel_init_freeable+0x4ec/0x5a0\n kernel_init+0x30/0x1e0\n ret_from_kernel_user_thread+0x14/0x1c\n\n The buggy address belongs to the object at c000000364e80000\n which belongs to the cache kmalloc-128k of size 131072\n The buggy address is located 0 bytes to the right of\n allocated 98256-byte region [c000000364e80000, c000000364e97fd0)\n\n ==================================================================\n pseries-hotplug-mem: Failed to hot-remove memory at 0\n\nLog failed lookups with a separate message and dereference the\ncursor only when it points to a valid entry.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52451",
"url": "https://www.suse.com/security/cve/CVE-2023-52451"
},
{
"category": "external",
"summary": "SUSE Bug 1220250 for CVE-2023-52451",
"url": "https://bugzilla.suse.com/1220250"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-13T00:09:40Z",
"details": "moderate"
}
],
"title": "CVE-2023-52451"
},
{
"cve": "CVE-2023-52452",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52452"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Fix accesses to uninit stack slots\n\nPrivileged programs are supposed to be able to read uninitialized stack\nmemory (ever since 6715df8d5) but, before this patch, these accesses\nwere permitted inconsistently. In particular, accesses were permitted\nabove state-\u003eallocated_stack, but not below it. In other words, if the\nstack was already \"large enough\", the access was permitted, but\notherwise the access was rejected instead of being allowed to \"grow the\nstack\". This undesired rejection was happening in two places:\n- in check_stack_slot_within_bounds()\n- in check_stack_range_initialized()\nThis patch arranges for these accesses to be permitted. A bunch of tests\nthat were relying on the old rejection had to change; all of them were\nchanged to add also run unprivileged, in which case the old behavior\npersists. One tests couldn\u0027t be updated - global_func16 - because it\ncan\u0027t run unprivileged for other reasons.\n\nThis patch also fixes the tracking of the stack size for variable-offset\nreads. This second fix is bundled in the same commit as the first one\nbecause they\u0027re inter-related. Before this patch, writes to the stack\nusing registers containing a variable offset (as opposed to registers\nwith fixed, known values) were not properly contributing to the\nfunction\u0027s needed stack size. As a result, it was possible for a program\nto verify, but then to attempt to read out-of-bounds data at runtime\nbecause a too small stack had been allocated for it.\n\nEach function tracks the size of the stack it needs in\nbpf_subprog_info.stack_depth, which is maintained by\nupdate_stack_depth(). For regular memory accesses, check_mem_access()\nwas calling update_state_depth() but it was passing in only the fixed\npart of the offset register, ignoring the variable offset. This was\nincorrect; the minimum possible value of that register should be used\ninstead.\n\nThis tracking is now fixed by centralizing the tracking of stack size in\ngrow_stack_state(), and by lifting the calls to grow_stack_state() to\ncheck_stack_access_within_bounds() as suggested by Andrii. The code is\nnow simpler and more convincingly tracks the correct maximum stack size.\ncheck_stack_range_initialized() can now rely on enough stack having been\nallocated for the access; this helps with the fix for the first issue.\n\nA few tests were changed to also check the stack depth computation. The\none that fails without this patch is verifier_var_off:stack_write_priv_vs_unpriv.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52452",
"url": "https://www.suse.com/security/cve/CVE-2023-52452"
},
{
"category": "external",
"summary": "SUSE Bug 1220257 for CVE-2023-52452",
"url": "https://bugzilla.suse.com/1220257"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-13T00:09:40Z",
"details": "moderate"
}
],
"title": "CVE-2023-52452"
},
{
"cve": "CVE-2023-52456",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52456"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nserial: imx: fix tx statemachine deadlock\n\nWhen using the serial port as RS485 port, the tx statemachine is used to\ncontrol the RTS pin to drive the RS485 transceiver TX_EN pin. When the\nTTY port is closed in the middle of a transmission (for instance during\nuserland application crash), imx_uart_shutdown disables the interface\nand disables the Transmission Complete interrupt. afer that,\nimx_uart_stop_tx bails on an incomplete transmission, to be retriggered\nby the TC interrupt. This interrupt is disabled and therefore the tx\nstatemachine never transitions out of SEND. The statemachine is in\ndeadlock now, and the TX_EN remains low, making the interface useless.\n\nimx_uart_stop_tx now checks for incomplete transmission AND whether TC\ninterrupts are enabled before bailing to be retriggered. This makes sure\nthe state machine handling is reached, and is properly set to\nWAIT_AFTER_SEND.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52456",
"url": "https://www.suse.com/security/cve/CVE-2023-52456"
},
{
"category": "external",
"summary": "SUSE Bug 1220364 for CVE-2023-52456",
"url": "https://bugzilla.suse.com/1220364"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-13T00:09:40Z",
"details": "moderate"
}
],
"title": "CVE-2023-52456"
},
{
"cve": "CVE-2023-52457",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52457"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nserial: 8250: omap: Don\u0027t skip resource freeing if pm_runtime_resume_and_get() failed\n\nReturning an error code from .remove() makes the driver core emit the\nlittle helpful error message:\n\n\tremove callback returned a non-zero value. This will be ignored.\n\nand then remove the device anyhow. So all resources that were not freed\nare leaked in this case. Skipping serial8250_unregister_port() has the\npotential to keep enough of the UART around to trigger a use-after-free.\n\nSo replace the error return (and with it the little helpful error\nmessage) by a more useful error message and continue to cleanup.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52457",
"url": "https://www.suse.com/security/cve/CVE-2023-52457"
},
{
"category": "external",
"summary": "SUSE Bug 1220350 for CVE-2023-52457",
"url": "https://bugzilla.suse.com/1220350"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-13T00:09:40Z",
"details": "moderate"
}
],
"title": "CVE-2023-52457"
},
{
"cve": "CVE-2023-52463",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52463"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nefivarfs: force RO when remounting if SetVariable is not supported\n\nIf SetVariable at runtime is not supported by the firmware we never assign\na callback for that function. At the same time mount the efivarfs as\nRO so no one can call that. However, we never check the permission flags\nwhen someone remounts the filesystem as RW. As a result this leads to a\ncrash looking like this:\n\n$ mount -o remount,rw /sys/firmware/efi/efivars\n$ efi-updatevar -f PK.auth PK\n\n[ 303.279166] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000000\n[ 303.280482] Mem abort info:\n[ 303.280854] ESR = 0x0000000086000004\n[ 303.281338] EC = 0x21: IABT (current EL), IL = 32 bits\n[ 303.282016] SET = 0, FnV = 0\n[ 303.282414] EA = 0, S1PTW = 0\n[ 303.282821] FSC = 0x04: level 0 translation fault\n[ 303.283771] user pgtable: 4k pages, 48-bit VAs, pgdp=000000004258c000\n[ 303.284913] [0000000000000000] pgd=0000000000000000, p4d=0000000000000000\n[ 303.286076] Internal error: Oops: 0000000086000004 [#1] PREEMPT SMP\n[ 303.286936] Modules linked in: qrtr tpm_tis tpm_tis_core crct10dif_ce arm_smccc_trng rng_core drm fuse ip_tables x_tables ipv6\n[ 303.288586] CPU: 1 PID: 755 Comm: efi-updatevar Not tainted 6.3.0-rc1-00108-gc7d0c4695c68 #1\n[ 303.289748] Hardware name: Unknown Unknown Product/Unknown Product, BIOS 2023.04-00627-g88336918701d 04/01/2023\n[ 303.291150] pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n[ 303.292123] pc : 0x0\n[ 303.292443] lr : efivar_set_variable_locked+0x74/0xec\n[ 303.293156] sp : ffff800008673c10\n[ 303.293619] x29: ffff800008673c10 x28: ffff0000037e8000 x27: 0000000000000000\n[ 303.294592] x26: 0000000000000800 x25: ffff000002467400 x24: 0000000000000027\n[ 303.295572] x23: ffffd49ea9832000 x22: ffff0000020c9800 x21: ffff000002467000\n[ 303.296566] x20: 0000000000000001 x19: 00000000000007fc x18: 0000000000000000\n[ 303.297531] x17: 0000000000000000 x16: 0000000000000000 x15: 0000aaaac807ab54\n[ 303.298495] x14: ed37489f673633c0 x13: 71c45c606de13f80 x12: 47464259e219acf4\n[ 303.299453] x11: ffff000002af7b01 x10: 0000000000000003 x9 : 0000000000000002\n[ 303.300431] x8 : 0000000000000010 x7 : ffffd49ea8973230 x6 : 0000000000a85201\n[ 303.301412] x5 : 0000000000000000 x4 : ffff0000020c9800 x3 : 00000000000007fc\n[ 303.302370] x2 : 0000000000000027 x1 : ffff000002467400 x0 : ffff000002467000\n[ 303.303341] Call trace:\n[ 303.303679] 0x0\n[ 303.303938] efivar_entry_set_get_size+0x98/0x16c\n[ 303.304585] efivarfs_file_write+0xd0/0x1a4\n[ 303.305148] vfs_write+0xc4/0x2e4\n[ 303.305601] ksys_write+0x70/0x104\n[ 303.306073] __arm64_sys_write+0x1c/0x28\n[ 303.306622] invoke_syscall+0x48/0x114\n[ 303.307156] el0_svc_common.constprop.0+0x44/0xec\n[ 303.307803] do_el0_svc+0x38/0x98\n[ 303.308268] el0_svc+0x2c/0x84\n[ 303.308702] el0t_64_sync_handler+0xf4/0x120\n[ 303.309293] el0t_64_sync+0x190/0x194\n[ 303.309794] Code: ???????? ???????? ???????? ???????? (????????)\n[ 303.310612] ---[ end trace 0000000000000000 ]---\n\nFix this by adding a .reconfigure() function to the fs operations which\nwe can use to check the requested flags and deny anything that\u0027s not RO\nif the firmware doesn\u0027t implement SetVariable at runtime.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52463",
"url": "https://www.suse.com/security/cve/CVE-2023-52463"
},
{
"category": "external",
"summary": "SUSE Bug 1220328 for CVE-2023-52463",
"url": "https://bugzilla.suse.com/1220328"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-13T00:09:40Z",
"details": "moderate"
}
],
"title": "CVE-2023-52463"
},
{
"cve": "CVE-2023-52464",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52464"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nEDAC/thunderx: Fix possible out-of-bounds string access\n\nEnabling -Wstringop-overflow globally exposes a warning for a common bug\nin the usage of strncat():\n\n drivers/edac/thunderx_edac.c: In function \u0027thunderx_ocx_com_threaded_isr\u0027:\n drivers/edac/thunderx_edac.c:1136:17: error: \u0027strncat\u0027 specified bound 1024 equals destination size [-Werror=stringop-overflow=]\n 1136 | strncat(msg, other, OCX_MESSAGE_SIZE);\n | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~\n ...\n 1145 | strncat(msg, other, OCX_MESSAGE_SIZE);\n ...\n 1150 | strncat(msg, other, OCX_MESSAGE_SIZE);\n\n ...\n\nApparently the author of this driver expected strncat() to behave the\nway that strlcat() does, which uses the size of the destination buffer\nas its third argument rather than the length of the source buffer. The\nresult is that there is no check on the size of the allocated buffer.\n\nChange it to strlcat().\n\n [ bp: Trim compiler output, fixup commit message. ]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52464",
"url": "https://www.suse.com/security/cve/CVE-2023-52464"
},
{
"category": "external",
"summary": "SUSE Bug 1220330 for CVE-2023-52464",
"url": "https://bugzilla.suse.com/1220330"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-13T00:09:40Z",
"details": "moderate"
}
],
"title": "CVE-2023-52464"
},
{
"cve": "CVE-2023-52475",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52475"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nInput: powermate - fix use-after-free in powermate_config_complete\n\nsyzbot has found a use-after-free bug [1] in the powermate driver. This\nhappens when the device is disconnected, which leads to a memory free from\nthe powermate_device struct. When an asynchronous control message\ncompletes after the kfree and its callback is invoked, the lock does not\nexist anymore and hence the bug.\n\nUse usb_kill_urb() on pm-\u003econfig to cancel any in-progress requests upon\ndevice disconnection.\n\n[1] https://syzkaller.appspot.com/bug?extid=0434ac83f907a1dbdd1e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52475",
"url": "https://www.suse.com/security/cve/CVE-2023-52475"
},
{
"category": "external",
"summary": "SUSE Bug 1220649 for CVE-2023-52475",
"url": "https://bugzilla.suse.com/1220649"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-13T00:09:40Z",
"details": "moderate"
}
],
"title": "CVE-2023-52475"
},
{
"cve": "CVE-2023-52478",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52478"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: logitech-hidpp: Fix kernel crash on receiver USB disconnect\n\nhidpp_connect_event() has *four* time-of-check vs time-of-use (TOCTOU)\nraces when it races with itself.\n\nhidpp_connect_event() primarily runs from a workqueue but it also runs\non probe() and if a \"device-connected\" packet is received by the hw\nwhen the thread running hidpp_connect_event() from probe() is waiting on\nthe hw, then a second thread running hidpp_connect_event() will be\nstarted from the workqueue.\n\nThis opens the following races (note the below code is simplified):\n\n1. Retrieving + printing the protocol (harmless race):\n\n\tif (!hidpp-\u003eprotocol_major) {\n\t\thidpp_root_get_protocol_version()\n\t\thidpp-\u003eprotocol_major = response.rap.params[0];\n\t}\n\nWe can actually see this race hit in the dmesg in the abrt output\nattached to rhbz#2227968:\n\n[ 3064.624215] logitech-hidpp-device 0003:046D:4071.0049: HID++ 4.5 device connected.\n[ 3064.658184] logitech-hidpp-device 0003:046D:4071.0049: HID++ 4.5 device connected.\n\nTesting with extra logging added has shown that after this the 2 threads\ntake turn grabbing the hw access mutex (send_mutex) so they ping-pong\nthrough all the other TOCTOU cases managing to hit all of them:\n\n2. Updating the name to the HIDPP name (harmless race):\n\n\tif (hidpp-\u003ename == hdev-\u003ename) {\n\t\t...\n\t\thidpp-\u003ename = new_name;\n\t}\n\n3. Initializing the power_supply class for the battery (problematic!):\n\nhidpp_initialize_battery()\n{\n if (hidpp-\u003ebattery.ps)\n return 0;\n\n\tprobe_battery(); /* Blocks, threads take turns executing this */\n\n\thidpp-\u003ebattery.desc.properties =\n\t\tdevm_kmemdup(dev, hidpp_battery_props, cnt, GFP_KERNEL);\n\n\thidpp-\u003ebattery.ps =\n\t\tdevm_power_supply_register(\u0026hidpp-\u003ehid_dev-\u003edev,\n\t\t\t\t\t \u0026hidpp-\u003ebattery.desc, cfg);\n}\n\n4. Creating delayed input_device (potentially problematic):\n\n\tif (hidpp-\u003edelayed_input)\n\t\treturn;\n\n\thidpp-\u003edelayed_input = hidpp_allocate_input(hdev);\n\nThe really big problem here is 3. Hitting the race leads to the following\nsequence:\n\n\thidpp-\u003ebattery.desc.properties =\n\t\tdevm_kmemdup(dev, hidpp_battery_props, cnt, GFP_KERNEL);\n\n\thidpp-\u003ebattery.ps =\n\t\tdevm_power_supply_register(\u0026hidpp-\u003ehid_dev-\u003edev,\n\t\t\t\t\t \u0026hidpp-\u003ebattery.desc, cfg);\n\n\t...\n\n\thidpp-\u003ebattery.desc.properties =\n\t\tdevm_kmemdup(dev, hidpp_battery_props, cnt, GFP_KERNEL);\n\n\thidpp-\u003ebattery.ps =\n\t\tdevm_power_supply_register(\u0026hidpp-\u003ehid_dev-\u003edev,\n\t\t\t\t\t \u0026hidpp-\u003ebattery.desc, cfg);\n\nSo now we have registered 2 power supplies for the same battery,\nwhich looks a bit weird from userspace\u0027s pov but this is not even\nthe really big problem.\n\nNotice how:\n\n1. This is all devm-maganaged\n2. The hidpp-\u003ebattery.desc struct is shared between the 2 power supplies\n3. hidpp-\u003ebattery.desc.properties points to the result from the second\n devm_kmemdup()\n\nThis causes a use after free scenario on USB disconnect of the receiver:\n1. The last registered power supply class device gets unregistered\n2. The memory from the last devm_kmemdup() call gets freed,\n hidpp-\u003ebattery.desc.properties now points to freed memory\n3. The first registered power supply class device gets unregistered,\n this involves sending a remove uevent to userspace which invokes\n power_supply_uevent() to fill the uevent data\n4. power_supply_uevent() uses hidpp-\u003ebattery.desc.properties which\n now points to freed memory leading to backtraces like this one:\n\nSep 22 20:01:35 eric kernel: BUG: unable to handle page fault for address: ffffb2140e017f08\n...\nSep 22 20:01:35 eric kernel: Workqueue: usb_hub_wq hub_event\nSep 22 20:01:35 eric kernel: RIP: 0010:power_supply_uevent+0xee/0x1d0\n...\nSep 22 20:01:35 eric kernel: ? asm_exc_page_fault+0x26/0x30\nSep 22 20:01:35 eric kernel: ? power_supply_uevent+0xee/0x1d0\nSep 22 20:01:35 eric kernel: ? power_supply_uevent+0x10d/0x1d0\nSep 22 20:01:35 eric kernel: dev_uevent+0x10f/0x2d0\nSep 22 20:01:35 eric kernel: kobject_uevent_env+0x291/0x680\nSep 22 20:01:35 eric kernel: \n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52478",
"url": "https://www.suse.com/security/cve/CVE-2023-52478"
},
{
"category": "external",
"summary": "SUSE Bug 1220796 for CVE-2023-52478",
"url": "https://bugzilla.suse.com/1220796"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-13T00:09:40Z",
"details": "moderate"
}
],
"title": "CVE-2023-52478"
},
{
"cve": "CVE-2023-6817",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-6817"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free vulnerability in the Linux kernel\u0027s netfilter: nf_tables component can be exploited to achieve local privilege escalation.\n\nThe function nft_pipapo_walk did not skip inactive elements during set walk which could lead double deactivations of PIPAPO (Pile Packet Policies) elements, leading to use-after-free.\n\nWe recommend upgrading past commit 317eb9685095678f2c9f5a8189de698c5354316a.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-6817",
"url": "https://www.suse.com/security/cve/CVE-2023-6817"
},
{
"category": "external",
"summary": "SUSE Bug 1218195 for CVE-2023-6817",
"url": "https://bugzilla.suse.com/1218195"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-13T00:09:40Z",
"details": "moderate"
}
],
"title": "CVE-2023-6817"
},
{
"cve": "CVE-2024-0607",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-0607"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Netfilter subsystem in the Linux kernel. The issue is in the nft_byteorder_eval() function, where the code iterates through a loop and writes to the `dst` array. On each iteration, 8 bytes are written, but `dst` is an array of u32, so each element only has space for 4 bytes. That means every iteration overwrites part of the previous element corrupting this array of u32. This flaw allows a local user to cause a denial of service or potentially break NetFilter functionality.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-0607",
"url": "https://www.suse.com/security/cve/CVE-2024-0607"
},
{
"category": "external",
"summary": "SUSE Bug 1218915 for CVE-2024-0607",
"url": "https://bugzilla.suse.com/1218915"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-13T00:09:40Z",
"details": "moderate"
}
],
"title": "CVE-2024-0607"
},
{
"cve": "CVE-2024-1151",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-1151"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was reported in the Open vSwitch sub-component in the Linux Kernel. The flaw occurs when a recursive operation of code push recursively calls into the code block. The OVS module does not validate the stack depth, pushing too many frames and causing a stack overflow. As a result, this can lead to a crash or other related issues.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-1151",
"url": "https://www.suse.com/security/cve/CVE-2024-1151"
},
{
"category": "external",
"summary": "SUSE Bug 1219835 for CVE-2024-1151",
"url": "https://bugzilla.suse.com/1219835"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-13T00:09:40Z",
"details": "moderate"
}
],
"title": "CVE-2024-1151"
},
{
"cve": "CVE-2024-23849",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-23849"
}
],
"notes": [
{
"category": "general",
"text": "In rds_recv_track_latency in net/rds/af_rds.c in the Linux kernel through 6.7.1, there is an off-by-one error for an RDS_MSG_RX_DGRAM_TRACE_MAX comparison, resulting in out-of-bounds access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-23849",
"url": "https://www.suse.com/security/cve/CVE-2024-23849"
},
{
"category": "external",
"summary": "SUSE Bug 1219127 for CVE-2024-23849",
"url": "https://bugzilla.suse.com/1219127"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-13T00:09:40Z",
"details": "moderate"
}
],
"title": "CVE-2024-23849"
},
{
"cve": "CVE-2024-23850",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-23850"
}
],
"notes": [
{
"category": "general",
"text": "In btrfs_get_root_ref in fs/btrfs/disk-io.c in the Linux kernel through 6.7.1, there can be an assertion failure and crash because a subvolume can be read out too soon after its root item is inserted upon subvolume creation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-23850",
"url": "https://www.suse.com/security/cve/CVE-2024-23850"
},
{
"category": "external",
"summary": "SUSE Bug 1219126 for CVE-2024-23850",
"url": "https://bugzilla.suse.com/1219126"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-13T00:09:40Z",
"details": "moderate"
}
],
"title": "CVE-2024-23850"
},
{
"cve": "CVE-2024-23851",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-23851"
}
],
"notes": [
{
"category": "general",
"text": "copy_params in drivers/md/dm-ioctl.c in the Linux kernel through 6.7.1 can attempt to allocate more than INT_MAX bytes, and crash, because of a missing param_kernel-\u003edata_size check. This is related to ctl_ioctl.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-23851",
"url": "https://www.suse.com/security/cve/CVE-2024-23851"
},
{
"category": "external",
"summary": "SUSE Bug 1219146 for CVE-2024-23851",
"url": "https://bugzilla.suse.com/1219146"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-13T00:09:40Z",
"details": "moderate"
}
],
"title": "CVE-2024-23851"
},
{
"cve": "CVE-2024-25744",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-25744"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 6.6.7, an untrusted VMM can trigger int80 syscall handling at any given point. This is related to arch/x86/coco/tdx/tdx.c and arch/x86/mm/mem_encrypt_amd.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-25744",
"url": "https://www.suse.com/security/cve/CVE-2024-25744"
},
{
"category": "external",
"summary": "SUSE Bug 1217927 for CVE-2024-25744",
"url": "https://bugzilla.suse.com/1217927"
},
{
"category": "external",
"summary": "SUSE Bug 1220314 for CVE-2024-25744",
"url": "https://bugzilla.suse.com/1220314"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-13T00:09:40Z",
"details": "important"
}
],
"title": "CVE-2024-25744"
},
{
"cve": "CVE-2024-26585",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26585"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntls: fix race between tx work scheduling and socket close\n\nSimilarly to previous commit, the submitting thread (recvmsg/sendmsg)\nmay exit as soon as the async crypto handler calls complete().\nReorder scheduling the work before calling complete().\nThis seems more logical in the first place, as it\u0027s\nthe inverse order of what the submitting thread will do.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26585",
"url": "https://www.suse.com/security/cve/CVE-2024-26585"
},
{
"category": "external",
"summary": "SUSE Bug 1220187 for CVE-2024-26585",
"url": "https://bugzilla.suse.com/1220187"
},
{
"category": "external",
"summary": "SUSE Bug 1220211 for CVE-2024-26585",
"url": "https://bugzilla.suse.com/1220211"
},
{
"category": "external",
"summary": "SUSE Bug 1224298 for CVE-2024-26585",
"url": "https://bugzilla.suse.com/1224298"
},
{
"category": "external",
"summary": "SUSE Bug 1224878 for CVE-2024-26585",
"url": "https://bugzilla.suse.com/1224878"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-13T00:09:40Z",
"details": "important"
}
],
"title": "CVE-2024-26585"
},
{
"cve": "CVE-2024-26586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26586"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmlxsw: spectrum_acl_tcam: Fix stack corruption\n\nWhen tc filters are first added to a net device, the corresponding local\nport gets bound to an ACL group in the device. The group contains a list\nof ACLs. In turn, each ACL points to a different TCAM region where the\nfilters are stored. During forwarding, the ACLs are sequentially\nevaluated until a match is found.\n\nOne reason to place filters in different regions is when they are added\nwith decreasing priorities and in an alternating order so that two\nconsecutive filters can never fit in the same region because of their\nkey usage.\n\nIn Spectrum-2 and newer ASICs the firmware started to report that the\nmaximum number of ACLs in a group is more than 16, but the layout of the\nregister that configures ACL groups (PAGT) was not updated to account\nfor that. It is therefore possible to hit stack corruption [1] in the\nrare case where more than 16 ACLs in a group are required.\n\nFix by limiting the maximum ACL group size to the minimum between what\nthe firmware reports and the maximum ACLs that fit in the PAGT register.\n\nAdd a test case to make sure the machine does not crash when this\ncondition is hit.\n\n[1]\nKernel panic - not syncing: stack-protector: Kernel stack is corrupted in: mlxsw_sp_acl_tcam_group_update+0x116/0x120\n[...]\n dump_stack_lvl+0x36/0x50\n panic+0x305/0x330\n __stack_chk_fail+0x15/0x20\n mlxsw_sp_acl_tcam_group_update+0x116/0x120\n mlxsw_sp_acl_tcam_group_region_attach+0x69/0x110\n mlxsw_sp_acl_tcam_vchunk_get+0x492/0xa20\n mlxsw_sp_acl_tcam_ventry_add+0x25/0xe0\n mlxsw_sp_acl_rule_add+0x47/0x240\n mlxsw_sp_flower_replace+0x1a9/0x1d0\n tc_setup_cb_add+0xdc/0x1c0\n fl_hw_replace_filter+0x146/0x1f0\n fl_change+0xc17/0x1360\n tc_new_tfilter+0x472/0xb90\n rtnetlink_rcv_msg+0x313/0x3b0\n netlink_rcv_skb+0x58/0x100\n netlink_unicast+0x244/0x390\n netlink_sendmsg+0x1e4/0x440\n ____sys_sendmsg+0x164/0x260\n ___sys_sendmsg+0x9a/0xe0\n __sys_sendmsg+0x7a/0xc0\n do_syscall_64+0x40/0xe0\n entry_SYSCALL_64_after_hwframe+0x63/0x6b",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26586",
"url": "https://www.suse.com/security/cve/CVE-2024-26586"
},
{
"category": "external",
"summary": "SUSE Bug 1220243 for CVE-2024-26586",
"url": "https://bugzilla.suse.com/1220243"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-13T00:09:40Z",
"details": "moderate"
}
],
"title": "CVE-2024-26586"
},
{
"cve": "CVE-2024-26589",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26589"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Reject variable offset alu on PTR_TO_FLOW_KEYS\n\nFor PTR_TO_FLOW_KEYS, check_flow_keys_access() only uses fixed off\nfor validation. However, variable offset ptr alu is not prohibited\nfor this ptr kind. So the variable offset is not checked.\n\nThe following prog is accepted:\n\n func#0 @0\n 0: R1=ctx() R10=fp0\n 0: (bf) r6 = r1 ; R1=ctx() R6_w=ctx()\n 1: (79) r7 = *(u64 *)(r6 +144) ; R6_w=ctx() R7_w=flow_keys()\n 2: (b7) r8 = 1024 ; R8_w=1024\n 3: (37) r8 /= 1 ; R8_w=scalar()\n 4: (57) r8 \u0026= 1024 ; R8_w=scalar(smin=smin32=0,\n smax=umax=smax32=umax32=1024,var_off=(0x0; 0x400))\n 5: (0f) r7 += r8\n mark_precise: frame0: last_idx 5 first_idx 0 subseq_idx -1\n mark_precise: frame0: regs=r8 stack= before 4: (57) r8 \u0026= 1024\n mark_precise: frame0: regs=r8 stack= before 3: (37) r8 /= 1\n mark_precise: frame0: regs=r8 stack= before 2: (b7) r8 = 1024\n 6: R7_w=flow_keys(smin=smin32=0,smax=umax=smax32=umax32=1024,var_off\n =(0x0; 0x400)) R8_w=scalar(smin=smin32=0,smax=umax=smax32=umax32=1024,\n var_off=(0x0; 0x400))\n 6: (79) r0 = *(u64 *)(r7 +0) ; R0_w=scalar()\n 7: (95) exit\n\nThis prog loads flow_keys to r7, and adds the variable offset r8\nto r7, and finally causes out-of-bounds access:\n\n BUG: unable to handle page fault for address: ffffc90014c80038\n [...]\n Call Trace:\n \u003cTASK\u003e\n bpf_dispatcher_nop_func include/linux/bpf.h:1231 [inline]\n __bpf_prog_run include/linux/filter.h:651 [inline]\n bpf_prog_run include/linux/filter.h:658 [inline]\n bpf_prog_run_pin_on_cpu include/linux/filter.h:675 [inline]\n bpf_flow_dissect+0x15f/0x350 net/core/flow_dissector.c:991\n bpf_prog_test_run_flow_dissector+0x39d/0x620 net/bpf/test_run.c:1359\n bpf_prog_test_run kernel/bpf/syscall.c:4107 [inline]\n __sys_bpf+0xf8f/0x4560 kernel/bpf/syscall.c:5475\n __do_sys_bpf kernel/bpf/syscall.c:5561 [inline]\n __se_sys_bpf kernel/bpf/syscall.c:5559 [inline]\n __x64_sys_bpf+0x73/0xb0 kernel/bpf/syscall.c:5559\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0x3f/0x110 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x63/0x6b\n\nFix this by rejecting ptr alu with variable offset on flow_keys.\nApplying the patch rejects the program with \"R7 pointer arithmetic\non flow_keys prohibited\".",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26589",
"url": "https://www.suse.com/security/cve/CVE-2024-26589"
},
{
"category": "external",
"summary": "SUSE Bug 1220255 for CVE-2024-26589",
"url": "https://bugzilla.suse.com/1220255"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-13T00:09:40Z",
"details": "moderate"
}
],
"title": "CVE-2024-26589"
},
{
"cve": "CVE-2024-26591",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26591"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Fix re-attachment branch in bpf_tracing_prog_attach\n\nThe following case can cause a crash due to missing attach_btf:\n\n1) load rawtp program\n2) load fentry program with rawtp as target_fd\n3) create tracing link for fentry program with target_fd = 0\n4) repeat 3\n\nIn the end we have:\n\n- prog-\u003eaux-\u003edst_trampoline == NULL\n- tgt_prog == NULL (because we did not provide target_fd to link_create)\n- prog-\u003eaux-\u003eattach_btf == NULL (the program was loaded with attach_prog_fd=X)\n- the program was loaded for tgt_prog but we have no way to find out which one\n\n BUG: kernel NULL pointer dereference, address: 0000000000000058\n Call Trace:\n \u003cTASK\u003e\n ? __die+0x20/0x70\n ? page_fault_oops+0x15b/0x430\n ? fixup_exception+0x22/0x330\n ? exc_page_fault+0x6f/0x170\n ? asm_exc_page_fault+0x22/0x30\n ? bpf_tracing_prog_attach+0x279/0x560\n ? btf_obj_id+0x5/0x10\n bpf_tracing_prog_attach+0x439/0x560\n __sys_bpf+0x1cf4/0x2de0\n __x64_sys_bpf+0x1c/0x30\n do_syscall_64+0x41/0xf0\n entry_SYSCALL_64_after_hwframe+0x6e/0x76\n\nReturn -EINVAL in this situation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26591",
"url": "https://www.suse.com/security/cve/CVE-2024-26591"
},
{
"category": "external",
"summary": "SUSE Bug 1220254 for CVE-2024-26591",
"url": "https://bugzilla.suse.com/1220254"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-13T00:09:40Z",
"details": "moderate"
}
],
"title": "CVE-2024-26591"
},
{
"cve": "CVE-2024-26593",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26593"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ni2c: i801: Fix block process call transactions\n\nAccording to the Intel datasheets, software must reset the block\nbuffer index twice for block process call transactions: once before\nwriting the outgoing data to the buffer, and once again before\nreading the incoming data from the buffer.\n\nThe driver is currently missing the second reset, causing the wrong\nportion of the block buffer to be read.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26593",
"url": "https://www.suse.com/security/cve/CVE-2024-26593"
},
{
"category": "external",
"summary": "SUSE Bug 1220009 for CVE-2024-26593",
"url": "https://bugzilla.suse.com/1220009"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-13T00:09:40Z",
"details": "moderate"
}
],
"title": "CVE-2024-26593"
},
{
"cve": "CVE-2024-26595",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26595"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmlxsw: spectrum_acl_tcam: Fix NULL pointer dereference in error path\n\nWhen calling mlxsw_sp_acl_tcam_region_destroy() from an error path after\nfailing to attach the region to an ACL group, we hit a NULL pointer\ndereference upon \u0027region-\u003egroup-\u003etcam\u0027 [1].\n\nFix by retrieving the \u0027tcam\u0027 pointer using mlxsw_sp_acl_to_tcam().\n\n[1]\nBUG: kernel NULL pointer dereference, address: 0000000000000000\n[...]\nRIP: 0010:mlxsw_sp_acl_tcam_region_destroy+0xa0/0xd0\n[...]\nCall Trace:\n mlxsw_sp_acl_tcam_vchunk_get+0x88b/0xa20\n mlxsw_sp_acl_tcam_ventry_add+0x25/0xe0\n mlxsw_sp_acl_rule_add+0x47/0x240\n mlxsw_sp_flower_replace+0x1a9/0x1d0\n tc_setup_cb_add+0xdc/0x1c0\n fl_hw_replace_filter+0x146/0x1f0\n fl_change+0xc17/0x1360\n tc_new_tfilter+0x472/0xb90\n rtnetlink_rcv_msg+0x313/0x3b0\n netlink_rcv_skb+0x58/0x100\n netlink_unicast+0x244/0x390\n netlink_sendmsg+0x1e4/0x440\n ____sys_sendmsg+0x164/0x260\n ___sys_sendmsg+0x9a/0xe0\n __sys_sendmsg+0x7a/0xc0\n do_syscall_64+0x40/0xe0\n entry_SYSCALL_64_after_hwframe+0x63/0x6b",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26595",
"url": "https://www.suse.com/security/cve/CVE-2024-26595"
},
{
"category": "external",
"summary": "SUSE Bug 1220344 for CVE-2024-26595",
"url": "https://bugzilla.suse.com/1220344"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-13T00:09:40Z",
"details": "moderate"
}
],
"title": "CVE-2024-26595"
},
{
"cve": "CVE-2024-26598",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26598"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache\n\nThere is a potential UAF scenario in the case of an LPI translation\ncache hit racing with an operation that invalidates the cache, such\nas a DISCARD ITS command. The root of the problem is that\nvgic_its_check_cache() does not elevate the refcount on the vgic_irq\nbefore dropping the lock that serializes refcount changes.\n\nHave vgic_its_check_cache() raise the refcount on the returned vgic_irq\nand add the corresponding decrement after queueing the interrupt.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26598",
"url": "https://www.suse.com/security/cve/CVE-2024-26598"
},
{
"category": "external",
"summary": "SUSE Bug 1220326 for CVE-2024-26598",
"url": "https://bugzilla.suse.com/1220326"
},
{
"category": "external",
"summary": "SUSE Bug 1221129 for CVE-2024-26598",
"url": "https://bugzilla.suse.com/1221129"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-13T00:09:40Z",
"details": "important"
}
],
"title": "CVE-2024-26598"
},
{
"cve": "CVE-2024-26602",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26602"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsched/membarrier: reduce the ability to hammer on sys_membarrier\n\nOn some systems, sys_membarrier can be very expensive, causing overall\nslowdowns for everything. So put a lock on the path in order to\nserialize the accesses to prevent the ability for this to be called at\ntoo high of a frequency and saturate the machine.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26602",
"url": "https://www.suse.com/security/cve/CVE-2024-26602"
},
{
"category": "external",
"summary": "SUSE Bug 1220398 for CVE-2024-26602",
"url": "https://bugzilla.suse.com/1220398"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-13T00:09:40Z",
"details": "moderate"
}
],
"title": "CVE-2024-26602"
},
{
"cve": "CVE-2024-26603",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26603"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86/fpu: Stop relying on userspace for info to fault in xsave buffer\n\nBefore this change, the expected size of the user space buffer was\ntaken from fx_sw-\u003exstate_size. fx_sw-\u003exstate_size can be changed\nfrom user-space, so it is possible construct a sigreturn frame where:\n\n * fx_sw-\u003exstate_size is smaller than the size required by valid bits in\n fx_sw-\u003exfeatures.\n * user-space unmaps parts of the sigrame fpu buffer so that not all of\n the buffer required by xrstor is accessible.\n\nIn this case, xrstor tries to restore and accesses the unmapped area\nwhich results in a fault. But fault_in_readable succeeds because buf +\nfx_sw-\u003exstate_size is within the still mapped area, so it goes back and\ntries xrstor again. It will spin in this loop forever.\n\nInstead, fault in the maximum size which can be touched by XRSTOR (taken\nfrom fpstate-\u003euser_size).\n\n[ dhansen: tweak subject / changelog ]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26603",
"url": "https://www.suse.com/security/cve/CVE-2024-26603"
},
{
"category": "external",
"summary": "SUSE Bug 1220335 for CVE-2024-26603",
"url": "https://bugzilla.suse.com/1220335"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-13T00:09:40Z",
"details": "moderate"
}
],
"title": "CVE-2024-26603"
},
{
"cve": "CVE-2024-26622",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26622"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntomoyo: fix UAF write bug in tomoyo_write_control()\n\nSince tomoyo_write_control() updates head-\u003ewrite_buf when write()\nof long lines is requested, we need to fetch head-\u003ewrite_buf after\nhead-\u003eio_sem is held. Otherwise, concurrent write() requests can\ncause use-after-free-write and double-free problems.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26622",
"url": "https://www.suse.com/security/cve/CVE-2024-26622"
},
{
"category": "external",
"summary": "SUSE Bug 1220825 for CVE-2024-26622",
"url": "https://bugzilla.suse.com/1220825"
},
{
"category": "external",
"summary": "SUSE Bug 1220828 for CVE-2024-26622",
"url": "https://bugzilla.suse.com/1220828"
},
{
"category": "external",
"summary": "SUSE Bug 1224298 for CVE-2024-26622",
"url": "https://bugzilla.suse.com/1224298"
},
{
"category": "external",
"summary": "SUSE Bug 1224878 for CVE-2024-26622",
"url": "https://bugzilla.suse.com/1224878"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-1-150500.11.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.52.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.aarch64",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1.x86_64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.52.1.noarch",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.52.1.x86_64",
"openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.aarch64",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.ppc64le",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.s390x",
"openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-13T00:09:40Z",
"details": "important"
}
],
"title": "CVE-2024-26622"
}
]
}
SUSE-SU-2024:0900-1
Vulnerability from csaf_suse - Published: 2024-03-14 16:47 - Updated: 2024-03-14 16:47Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise 15 SP4 kernel was updated to receive various security bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2023-6270: Fixed a use-after-free issue in aoecmd_cfg_pkts (bsc#1218562).\n- CVE-2023-52463: Fixed null pointer dereference in efivarfs (bsc#1220328).\n- CVE-2023-52559: Fixed a bug by avoiding memory allocation in iommu_suspend (bsc#1220933).\n- CVE-2023-28746: Fixed Register File Data Sampling (bsc#1213456).\n- CVE-2023-52530: Fixed a potential key use-after-free in wifi mac80211 (bsc#1220930).\n- CVE-2024-26607: Fixed a probing race issue in sii902x: (bsc#1220736).\n- CVE-2023-52467: Fixed a null pointer dereference in of_syscon_register (bsc#1220433).\n- CVE-2024-26591: Fixed re-attachment branch in bpf_tracing_prog_attach (bsc#1220254).\n- CVE-2024-26589: Fixed out of bounds read due to variable offset alu on PTR_TO_FLOW_KEYS (bsc#1220255).\n- CVE-2023-52484: Fixed a soft lockup triggered by arm_smmu_mm_invalidate_range (bsc#1220797).\n- CVE-2024-26585: Fixed race between tx work scheduling and socket close (bsc#1220187).\n- CVE-2023-52340: Fixed ICMPv6 \u201cPacket Too Big\u201d packets force a DoS of the Linux kernel by forcing 100% CPU (bsc#1219295).\n- CVE-2024-0607: Fixed 64-bit load issue in nft_byteorder_eval() (bsc#1218915).\n- CVE-2023-6817: Fixed use-after-free in nft_pipapo_walk (bsc#1218195).\n- CVE-2024-26622: Fixed UAF write bug in tomoyo_write_control() (bsc#1220825).\n- CVE-2024-23850: Fixed double free of anonymous device after snapshot creation failure (bsc#1219126).\n- CVE-2023-52452: Fixed Fix accesses to uninit stack slots (bsc#1220257).\n- CVE-2023-52457: Fixed skipped resource freeing if pm_runtime_resume_and_get() failed (bsc#1220350).\n- CVE-2023-52456: Fixed tx statemachine deadlock (bsc#1220364).\n- CVE-2023-52451: Fixed access beyond end of drmem array (bsc#1220250).\n- CVE-2023-52449: Fixed gluebi NULL pointer dereference caused by ftl notifier (bsc#1220238).\n- CVE-2021-46923: Fixed reference leakage in fs/mount_setattr (bsc#1220457).\n- CVE-2023-52447: Fixed map_fd_put_ptr() signature kABI workaround (bsc#1220251).\n- CVE-2024-26598: Fixed potential UAF in LPI translation cache (bsc#1220326).\n- CVE-2024-26603: Fixed infinite loop via #PF handling (bsc#1220335).\n- CVE-2023-52445: Fixed use after free on context disconnection (bsc#1220241).\n- CVE-2023-52439: Fixed use-after-free in uio_open (bsc#1220140).\n- CVE-2023-52443: Fixed crash when parsed profile name is empty (bsc#1220240).\n- CVE-2024-26602: Fixed overall slowdowns with sys_membarrier (bsc1220398).\n- CVE-2024-26593: Fixed block process call transactions (bsc#1220009).\n- CVE-2024-26586: Fixed stack corruption (bsc#1220243).\n- CVE-2024-26595: Fixed NULL pointer dereference in error path (bsc#1220344).\n- CVE-2023-52464: Fixed possible out-of-bounds string access (bsc#1220330)\n- CVE-2023-52448: Fixed kernel NULL pointer dereference in gfs2_rgrp_dump (bsc#1220253).\n- CVE-2024-1151: Fixed unlimited number of recursions from action sets (bsc#1219835).\n- CVE-2023-5197: Fixed se-after-free due to addition and removal of rules from chain bindings within the same transaction (bsc#1218216).\n- CVE-2024-23849: Fixed array-index-out-of-bounds in rds_cmsg_recv (bsc#1219127).\n- CVE-2023-52429: Fixed potential DoS in dm_table_create in drivers/md/dm-table.c (bsc#1219827).\n- CVE-2024-23851: Fixed crash in copy_params in drivers/md/dm-ioctl.c (bsc#1219146).\n\nThe following non-security bugs were fixed:\n\n- bpf: Fix verification of indirect var-off stack access (git-fixes).\n- bpf: Guard stack limits against 32bit overflow (git-fixes).\n- KVM: VMX: Move VERW closer to VMentry for MDS mitigation (git-fixes).\n- KVM: VMX: Use BT+JNC, i.e. EFLAGS.CF to select VMRESUME vs. VMLAUNCH (git-fixes).\n- NFS: avoid infinite loop in pnfs_update_layout (bsc#1219633).\n- nvme: move nvme_stop_keep_alive() back to original position (bsc#1211515).\n- nvme: remove nvme_alloc_request and nvme_alloc_request_qid (bsc#1214064).\n- nvme: start keep-alive after admin queue setup (bsc#1211515).\n- x86/asm: Add _ASM_RIP() macro for x86-64 (%rip) suffix (git-fixes).\n- x86/bugs: Add asm helpers for executing VERW (git-fixes). \n- x86/bugs: Use ALTERNATIVE() instead of mds_user_clear static key (git-fixes).\n- x86/entry_32: Add VERW just before userspace transition (git-fixes).\n- x86/entry_64: Add VERW just before userspace transition (git-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2024-900,SUSE-SLE-Micro-5.3-2024-900,SUSE-SLE-Micro-5.4-2024-900,SUSE-SLE-Module-Live-Patching-15-SP4-2024-900,SUSE-SLE-Product-HA-15-SP4-2024-900,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-900,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-900,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-900,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-900,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-900,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-900,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-900,openSUSE-Leap-Micro-5.3-2024-900,openSUSE-Leap-Micro-5.4-2024-900",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_0900-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2024:0900-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20240900-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2024:0900-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html"
},
{
"category": "self",
"summary": "SUSE Bug 1211515",
"url": "https://bugzilla.suse.com/1211515"
},
{
"category": "self",
"summary": "SUSE Bug 1213456",
"url": "https://bugzilla.suse.com/1213456"
},
{
"category": "self",
"summary": "SUSE Bug 1214064",
"url": "https://bugzilla.suse.com/1214064"
},
{
"category": "self",
"summary": "SUSE Bug 1218195",
"url": "https://bugzilla.suse.com/1218195"
},
{
"category": "self",
"summary": "SUSE Bug 1218216",
"url": "https://bugzilla.suse.com/1218216"
},
{
"category": "self",
"summary": "SUSE Bug 1218562",
"url": "https://bugzilla.suse.com/1218562"
},
{
"category": "self",
"summary": "SUSE Bug 1218915",
"url": "https://bugzilla.suse.com/1218915"
},
{
"category": "self",
"summary": "SUSE Bug 1219073",
"url": "https://bugzilla.suse.com/1219073"
},
{
"category": "self",
"summary": "SUSE Bug 1219126",
"url": "https://bugzilla.suse.com/1219126"
},
{
"category": "self",
"summary": "SUSE Bug 1219127",
"url": "https://bugzilla.suse.com/1219127"
},
{
"category": "self",
"summary": "SUSE Bug 1219146",
"url": "https://bugzilla.suse.com/1219146"
},
{
"category": "self",
"summary": "SUSE Bug 1219295",
"url": "https://bugzilla.suse.com/1219295"
},
{
"category": "self",
"summary": "SUSE Bug 1219633",
"url": "https://bugzilla.suse.com/1219633"
},
{
"category": "self",
"summary": "SUSE Bug 1219653",
"url": "https://bugzilla.suse.com/1219653"
},
{
"category": "self",
"summary": "SUSE Bug 1219827",
"url": "https://bugzilla.suse.com/1219827"
},
{
"category": "self",
"summary": "SUSE Bug 1219835",
"url": "https://bugzilla.suse.com/1219835"
},
{
"category": "self",
"summary": "SUSE Bug 1220009",
"url": "https://bugzilla.suse.com/1220009"
},
{
"category": "self",
"summary": "SUSE Bug 1220140",
"url": "https://bugzilla.suse.com/1220140"
},
{
"category": "self",
"summary": "SUSE Bug 1220187",
"url": "https://bugzilla.suse.com/1220187"
},
{
"category": "self",
"summary": "SUSE Bug 1220238",
"url": "https://bugzilla.suse.com/1220238"
},
{
"category": "self",
"summary": "SUSE Bug 1220240",
"url": "https://bugzilla.suse.com/1220240"
},
{
"category": "self",
"summary": "SUSE Bug 1220241",
"url": "https://bugzilla.suse.com/1220241"
},
{
"category": "self",
"summary": "SUSE Bug 1220243",
"url": "https://bugzilla.suse.com/1220243"
},
{
"category": "self",
"summary": "SUSE Bug 1220250",
"url": "https://bugzilla.suse.com/1220250"
},
{
"category": "self",
"summary": "SUSE Bug 1220251",
"url": "https://bugzilla.suse.com/1220251"
},
{
"category": "self",
"summary": "SUSE Bug 1220253",
"url": "https://bugzilla.suse.com/1220253"
},
{
"category": "self",
"summary": "SUSE Bug 1220254",
"url": "https://bugzilla.suse.com/1220254"
},
{
"category": "self",
"summary": "SUSE Bug 1220255",
"url": "https://bugzilla.suse.com/1220255"
},
{
"category": "self",
"summary": "SUSE Bug 1220257",
"url": "https://bugzilla.suse.com/1220257"
},
{
"category": "self",
"summary": "SUSE Bug 1220326",
"url": "https://bugzilla.suse.com/1220326"
},
{
"category": "self",
"summary": "SUSE Bug 1220328",
"url": "https://bugzilla.suse.com/1220328"
},
{
"category": "self",
"summary": "SUSE Bug 1220330",
"url": "https://bugzilla.suse.com/1220330"
},
{
"category": "self",
"summary": "SUSE Bug 1220335",
"url": "https://bugzilla.suse.com/1220335"
},
{
"category": "self",
"summary": "SUSE Bug 1220344",
"url": "https://bugzilla.suse.com/1220344"
},
{
"category": "self",
"summary": "SUSE Bug 1220350",
"url": "https://bugzilla.suse.com/1220350"
},
{
"category": "self",
"summary": "SUSE Bug 1220364",
"url": "https://bugzilla.suse.com/1220364"
},
{
"category": "self",
"summary": "SUSE Bug 1220398",
"url": "https://bugzilla.suse.com/1220398"
},
{
"category": "self",
"summary": "SUSE Bug 1220409",
"url": "https://bugzilla.suse.com/1220409"
},
{
"category": "self",
"summary": "SUSE Bug 1220433",
"url": "https://bugzilla.suse.com/1220433"
},
{
"category": "self",
"summary": "SUSE Bug 1220444",
"url": "https://bugzilla.suse.com/1220444"
},
{
"category": "self",
"summary": "SUSE Bug 1220457",
"url": "https://bugzilla.suse.com/1220457"
},
{
"category": "self",
"summary": "SUSE Bug 1220459",
"url": "https://bugzilla.suse.com/1220459"
},
{
"category": "self",
"summary": "SUSE Bug 1220469",
"url": "https://bugzilla.suse.com/1220469"
},
{
"category": "self",
"summary": "SUSE Bug 1220649",
"url": "https://bugzilla.suse.com/1220649"
},
{
"category": "self",
"summary": "SUSE Bug 1220735",
"url": "https://bugzilla.suse.com/1220735"
},
{
"category": "self",
"summary": "SUSE Bug 1220736",
"url": "https://bugzilla.suse.com/1220736"
},
{
"category": "self",
"summary": "SUSE Bug 1220796",
"url": "https://bugzilla.suse.com/1220796"
},
{
"category": "self",
"summary": "SUSE Bug 1220797",
"url": "https://bugzilla.suse.com/1220797"
},
{
"category": "self",
"summary": "SUSE Bug 1220825",
"url": "https://bugzilla.suse.com/1220825"
},
{
"category": "self",
"summary": "SUSE Bug 1220845",
"url": "https://bugzilla.suse.com/1220845"
},
{
"category": "self",
"summary": "SUSE Bug 1220917",
"url": "https://bugzilla.suse.com/1220917"
},
{
"category": "self",
"summary": "SUSE Bug 1220930",
"url": "https://bugzilla.suse.com/1220930"
},
{
"category": "self",
"summary": "SUSE Bug 1220931",
"url": "https://bugzilla.suse.com/1220931"
},
{
"category": "self",
"summary": "SUSE Bug 1220933",
"url": "https://bugzilla.suse.com/1220933"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-25162 page",
"url": "https://www.suse.com/security/cve/CVE-2019-25162/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-46923 page",
"url": "https://www.suse.com/security/cve/CVE-2021-46923/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-46924 page",
"url": "https://www.suse.com/security/cve/CVE-2021-46924/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-46932 page",
"url": "https://www.suse.com/security/cve/CVE-2021-46932/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-46934 page",
"url": "https://www.suse.com/security/cve/CVE-2021-46934/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47083 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47083/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48627 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48627/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-28746 page",
"url": "https://www.suse.com/security/cve/CVE-2023-28746/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-5197 page",
"url": "https://www.suse.com/security/cve/CVE-2023-5197/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52340 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52340/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52429 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52429/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52439 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52439/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52443 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52443/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52445 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52445/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52447 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52447/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52448 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52448/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52449 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52449/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52451 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52451/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52452 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52452/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52456 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52456/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52457 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52457/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52463 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52463/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52464 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52464/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52467 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52467/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52475 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52475/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52478 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52478/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52482 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52482/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52484 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52484/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52530 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52530/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52531 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52531/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52559 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52559/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-6270 page",
"url": "https://www.suse.com/security/cve/CVE-2023-6270/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-6817 page",
"url": "https://www.suse.com/security/cve/CVE-2023-6817/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-0607 page",
"url": "https://www.suse.com/security/cve/CVE-2024-0607/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-1151 page",
"url": "https://www.suse.com/security/cve/CVE-2024-1151/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-23849 page",
"url": "https://www.suse.com/security/cve/CVE-2024-23849/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-23850 page",
"url": "https://www.suse.com/security/cve/CVE-2024-23850/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-23851 page",
"url": "https://www.suse.com/security/cve/CVE-2024-23851/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26585 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26585/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26586 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26589 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26589/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26591 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26591/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26593 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26593/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26595 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26595/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26598 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26598/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26602 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26602/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26603 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26603/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26607 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26607/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26622 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26622/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2024-03-14T16:47:20Z",
"generator": {
"date": "2024-03-14T16:47:20Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2024:0900-1",
"initial_release_date": "2024-03-14T16:47:20Z",
"revision_history": [
{
"date": "2024-03-14T16:47:20Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-64kb-5.14.21-150400.24.111.2.aarch64",
"product": {
"name": "cluster-md-kmp-64kb-5.14.21-150400.24.111.2.aarch64",
"product_id": "cluster-md-kmp-64kb-5.14.21-150400.24.111.2.aarch64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"product": {
"name": "cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"product_id": "cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-64kb-5.14.21-150400.24.111.2.aarch64",
"product": {
"name": "dlm-kmp-64kb-5.14.21-150400.24.111.2.aarch64",
"product_id": "dlm-kmp-64kb-5.14.21-150400.24.111.2.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"product": {
"name": "dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"product_id": "dlm-kmp-default-5.14.21-150400.24.111.2.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-allwinner-5.14.21-150400.24.111.1.aarch64",
"product": {
"name": "dtb-allwinner-5.14.21-150400.24.111.1.aarch64",
"product_id": "dtb-allwinner-5.14.21-150400.24.111.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-altera-5.14.21-150400.24.111.1.aarch64",
"product": {
"name": "dtb-altera-5.14.21-150400.24.111.1.aarch64",
"product_id": "dtb-altera-5.14.21-150400.24.111.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-amazon-5.14.21-150400.24.111.1.aarch64",
"product": {
"name": "dtb-amazon-5.14.21-150400.24.111.1.aarch64",
"product_id": "dtb-amazon-5.14.21-150400.24.111.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-amd-5.14.21-150400.24.111.1.aarch64",
"product": {
"name": "dtb-amd-5.14.21-150400.24.111.1.aarch64",
"product_id": "dtb-amd-5.14.21-150400.24.111.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-amlogic-5.14.21-150400.24.111.1.aarch64",
"product": {
"name": "dtb-amlogic-5.14.21-150400.24.111.1.aarch64",
"product_id": "dtb-amlogic-5.14.21-150400.24.111.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-apm-5.14.21-150400.24.111.1.aarch64",
"product": {
"name": "dtb-apm-5.14.21-150400.24.111.1.aarch64",
"product_id": "dtb-apm-5.14.21-150400.24.111.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-apple-5.14.21-150400.24.111.1.aarch64",
"product": {
"name": "dtb-apple-5.14.21-150400.24.111.1.aarch64",
"product_id": "dtb-apple-5.14.21-150400.24.111.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-arm-5.14.21-150400.24.111.1.aarch64",
"product": {
"name": "dtb-arm-5.14.21-150400.24.111.1.aarch64",
"product_id": "dtb-arm-5.14.21-150400.24.111.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-broadcom-5.14.21-150400.24.111.1.aarch64",
"product": {
"name": "dtb-broadcom-5.14.21-150400.24.111.1.aarch64",
"product_id": "dtb-broadcom-5.14.21-150400.24.111.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-cavium-5.14.21-150400.24.111.1.aarch64",
"product": {
"name": "dtb-cavium-5.14.21-150400.24.111.1.aarch64",
"product_id": "dtb-cavium-5.14.21-150400.24.111.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-exynos-5.14.21-150400.24.111.1.aarch64",
"product": {
"name": "dtb-exynos-5.14.21-150400.24.111.1.aarch64",
"product_id": "dtb-exynos-5.14.21-150400.24.111.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-freescale-5.14.21-150400.24.111.1.aarch64",
"product": {
"name": "dtb-freescale-5.14.21-150400.24.111.1.aarch64",
"product_id": "dtb-freescale-5.14.21-150400.24.111.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-hisilicon-5.14.21-150400.24.111.1.aarch64",
"product": {
"name": "dtb-hisilicon-5.14.21-150400.24.111.1.aarch64",
"product_id": "dtb-hisilicon-5.14.21-150400.24.111.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-lg-5.14.21-150400.24.111.1.aarch64",
"product": {
"name": "dtb-lg-5.14.21-150400.24.111.1.aarch64",
"product_id": "dtb-lg-5.14.21-150400.24.111.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-marvell-5.14.21-150400.24.111.1.aarch64",
"product": {
"name": "dtb-marvell-5.14.21-150400.24.111.1.aarch64",
"product_id": "dtb-marvell-5.14.21-150400.24.111.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-mediatek-5.14.21-150400.24.111.1.aarch64",
"product": {
"name": "dtb-mediatek-5.14.21-150400.24.111.1.aarch64",
"product_id": "dtb-mediatek-5.14.21-150400.24.111.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-nvidia-5.14.21-150400.24.111.1.aarch64",
"product": {
"name": "dtb-nvidia-5.14.21-150400.24.111.1.aarch64",
"product_id": "dtb-nvidia-5.14.21-150400.24.111.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-qcom-5.14.21-150400.24.111.1.aarch64",
"product": {
"name": "dtb-qcom-5.14.21-150400.24.111.1.aarch64",
"product_id": "dtb-qcom-5.14.21-150400.24.111.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-renesas-5.14.21-150400.24.111.1.aarch64",
"product": {
"name": "dtb-renesas-5.14.21-150400.24.111.1.aarch64",
"product_id": "dtb-renesas-5.14.21-150400.24.111.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-rockchip-5.14.21-150400.24.111.1.aarch64",
"product": {
"name": "dtb-rockchip-5.14.21-150400.24.111.1.aarch64",
"product_id": "dtb-rockchip-5.14.21-150400.24.111.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-socionext-5.14.21-150400.24.111.1.aarch64",
"product": {
"name": "dtb-socionext-5.14.21-150400.24.111.1.aarch64",
"product_id": "dtb-socionext-5.14.21-150400.24.111.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-sprd-5.14.21-150400.24.111.1.aarch64",
"product": {
"name": "dtb-sprd-5.14.21-150400.24.111.1.aarch64",
"product_id": "dtb-sprd-5.14.21-150400.24.111.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-xilinx-5.14.21-150400.24.111.1.aarch64",
"product": {
"name": "dtb-xilinx-5.14.21-150400.24.111.1.aarch64",
"product_id": "dtb-xilinx-5.14.21-150400.24.111.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-64kb-5.14.21-150400.24.111.2.aarch64",
"product": {
"name": "gfs2-kmp-64kb-5.14.21-150400.24.111.2.aarch64",
"product_id": "gfs2-kmp-64kb-5.14.21-150400.24.111.2.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"product": {
"name": "gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"product_id": "gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"product": {
"name": "kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"product_id": "kernel-64kb-5.14.21-150400.24.111.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"product": {
"name": "kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"product_id": "kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-extra-5.14.21-150400.24.111.2.aarch64",
"product": {
"name": "kernel-64kb-extra-5.14.21-150400.24.111.2.aarch64",
"product_id": "kernel-64kb-extra-5.14.21-150400.24.111.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-livepatch-devel-5.14.21-150400.24.111.2.aarch64",
"product": {
"name": "kernel-64kb-livepatch-devel-5.14.21-150400.24.111.2.aarch64",
"product_id": "kernel-64kb-livepatch-devel-5.14.21-150400.24.111.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-optional-5.14.21-150400.24.111.2.aarch64",
"product": {
"name": "kernel-64kb-optional-5.14.21-150400.24.111.2.aarch64",
"product_id": "kernel-64kb-optional-5.14.21-150400.24.111.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-5.14.21-150400.24.111.2.aarch64",
"product": {
"name": "kernel-default-5.14.21-150400.24.111.2.aarch64",
"product_id": "kernel-default-5.14.21-150400.24.111.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"product": {
"name": "kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"product_id": "kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"product": {
"name": "kernel-default-base-rebuild-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"product_id": "kernel-default-base-rebuild-5.14.21-150400.24.111.2.150400.24.52.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"product": {
"name": "kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"product_id": "kernel-default-devel-5.14.21-150400.24.111.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.14.21-150400.24.111.2.aarch64",
"product": {
"name": "kernel-default-extra-5.14.21-150400.24.111.2.aarch64",
"product_id": "kernel-default-extra-5.14.21-150400.24.111.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.14.21-150400.24.111.2.aarch64",
"product": {
"name": "kernel-default-livepatch-5.14.21-150400.24.111.2.aarch64",
"product_id": "kernel-default-livepatch-5.14.21-150400.24.111.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.14.21-150400.24.111.2.aarch64",
"product": {
"name": "kernel-default-livepatch-devel-5.14.21-150400.24.111.2.aarch64",
"product_id": "kernel-default-livepatch-devel-5.14.21-150400.24.111.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-5.14.21-150400.24.111.2.aarch64",
"product": {
"name": "kernel-default-optional-5.14.21-150400.24.111.2.aarch64",
"product_id": "kernel-default-optional-5.14.21-150400.24.111.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-5.14.21-150400.24.111.2.aarch64",
"product": {
"name": "kernel-kvmsmall-5.14.21-150400.24.111.2.aarch64",
"product_id": "kernel-kvmsmall-5.14.21-150400.24.111.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-5.14.21-150400.24.111.2.aarch64",
"product": {
"name": "kernel-kvmsmall-devel-5.14.21-150400.24.111.2.aarch64",
"product_id": "kernel-kvmsmall-devel-5.14.21-150400.24.111.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.111.2.aarch64",
"product": {
"name": "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.111.2.aarch64",
"product_id": "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.111.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"product": {
"name": "kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"product_id": "kernel-obs-build-5.14.21-150400.24.111.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.14.21-150400.24.111.1.aarch64",
"product": {
"name": "kernel-obs-qa-5.14.21-150400.24.111.1.aarch64",
"product_id": "kernel-obs-qa-5.14.21-150400.24.111.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.14.21-150400.24.111.1.aarch64",
"product": {
"name": "kernel-syms-5.14.21-150400.24.111.1.aarch64",
"product_id": "kernel-syms-5.14.21-150400.24.111.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-64kb-5.14.21-150400.24.111.2.aarch64",
"product": {
"name": "kselftests-kmp-64kb-5.14.21-150400.24.111.2.aarch64",
"product_id": "kselftests-kmp-64kb-5.14.21-150400.24.111.2.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.14.21-150400.24.111.2.aarch64",
"product": {
"name": "kselftests-kmp-default-5.14.21-150400.24.111.2.aarch64",
"product_id": "kselftests-kmp-default-5.14.21-150400.24.111.2.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-64kb-5.14.21-150400.24.111.2.aarch64",
"product": {
"name": "ocfs2-kmp-64kb-5.14.21-150400.24.111.2.aarch64",
"product_id": "ocfs2-kmp-64kb-5.14.21-150400.24.111.2.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"product": {
"name": "ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"product_id": "ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-64kb-5.14.21-150400.24.111.2.aarch64",
"product": {
"name": "reiserfs-kmp-64kb-5.14.21-150400.24.111.2.aarch64",
"product_id": "reiserfs-kmp-64kb-5.14.21-150400.24.111.2.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"product": {
"name": "reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"product_id": "reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-5.14.21-150400.24.111.1.noarch",
"product": {
"name": "kernel-devel-5.14.21-150400.24.111.1.noarch",
"product_id": "kernel-devel-5.14.21-150400.24.111.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-5.14.21-150400.24.111.2.noarch",
"product": {
"name": "kernel-docs-5.14.21-150400.24.111.2.noarch",
"product_id": "kernel-docs-5.14.21-150400.24.111.2.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-5.14.21-150400.24.111.2.noarch",
"product": {
"name": "kernel-docs-html-5.14.21-150400.24.111.2.noarch",
"product_id": "kernel-docs-html-5.14.21-150400.24.111.2.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-5.14.21-150400.24.111.1.noarch",
"product": {
"name": "kernel-macros-5.14.21-150400.24.111.1.noarch",
"product_id": "kernel-macros-5.14.21-150400.24.111.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-5.14.21-150400.24.111.1.noarch",
"product": {
"name": "kernel-source-5.14.21-150400.24.111.1.noarch",
"product_id": "kernel-source-5.14.21-150400.24.111.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-5.14.21-150400.24.111.1.noarch",
"product": {
"name": "kernel-source-vanilla-5.14.21-150400.24.111.1.noarch",
"product_id": "kernel-source-vanilla-5.14.21-150400.24.111.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"product": {
"name": "cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"product_id": "cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"product": {
"name": "dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"product_id": "dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"product": {
"name": "gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"product_id": "gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-5.14.21-150400.24.111.2.ppc64le",
"product": {
"name": "kernel-debug-5.14.21-150400.24.111.2.ppc64le",
"product_id": "kernel-debug-5.14.21-150400.24.111.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-5.14.21-150400.24.111.2.ppc64le",
"product": {
"name": "kernel-debug-devel-5.14.21-150400.24.111.2.ppc64le",
"product_id": "kernel-debug-devel-5.14.21-150400.24.111.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"product": {
"name": "kernel-debug-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"product_id": "kernel-debug-livepatch-devel-5.14.21-150400.24.111.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-5.14.21-150400.24.111.2.ppc64le",
"product": {
"name": "kernel-default-5.14.21-150400.24.111.2.ppc64le",
"product_id": "kernel-default-5.14.21-150400.24.111.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"product": {
"name": "kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"product_id": "kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"product": {
"name": "kernel-default-base-rebuild-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"product_id": "kernel-default-base-rebuild-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"product": {
"name": "kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"product_id": "kernel-default-devel-5.14.21-150400.24.111.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.14.21-150400.24.111.2.ppc64le",
"product": {
"name": "kernel-default-extra-5.14.21-150400.24.111.2.ppc64le",
"product_id": "kernel-default-extra-5.14.21-150400.24.111.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"product": {
"name": "kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"product_id": "kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"product": {
"name": "kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"product_id": "kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-5.14.21-150400.24.111.2.ppc64le",
"product": {
"name": "kernel-default-optional-5.14.21-150400.24.111.2.ppc64le",
"product_id": "kernel-default-optional-5.14.21-150400.24.111.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-5.14.21-150400.24.111.2.ppc64le",
"product": {
"name": "kernel-kvmsmall-5.14.21-150400.24.111.2.ppc64le",
"product_id": "kernel-kvmsmall-5.14.21-150400.24.111.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-5.14.21-150400.24.111.2.ppc64le",
"product": {
"name": "kernel-kvmsmall-devel-5.14.21-150400.24.111.2.ppc64le",
"product_id": "kernel-kvmsmall-devel-5.14.21-150400.24.111.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"product": {
"name": "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"product_id": "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.111.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"product": {
"name": "kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"product_id": "kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"product": {
"name": "kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"product_id": "kernel-obs-build-5.14.21-150400.24.111.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.14.21-150400.24.111.1.ppc64le",
"product": {
"name": "kernel-obs-qa-5.14.21-150400.24.111.1.ppc64le",
"product_id": "kernel-obs-qa-5.14.21-150400.24.111.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"product": {
"name": "kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"product_id": "kernel-syms-5.14.21-150400.24.111.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"product": {
"name": "kselftests-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"product_id": "kselftests-kmp-default-5.14.21-150400.24.111.2.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"product": {
"name": "ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"product_id": "ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"product": {
"name": "reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"product_id": "reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"product": {
"name": "cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"product_id": "cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"product": {
"name": "dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"product_id": "dlm-kmp-default-5.14.21-150400.24.111.2.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"product": {
"name": "gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"product_id": "gfs2-kmp-default-5.14.21-150400.24.111.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-5.14.21-150400.24.111.2.s390x",
"product": {
"name": "kernel-default-5.14.21-150400.24.111.2.s390x",
"product_id": "kernel-default-5.14.21-150400.24.111.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"product": {
"name": "kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"product_id": "kernel-default-devel-5.14.21-150400.24.111.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.14.21-150400.24.111.2.s390x",
"product": {
"name": "kernel-default-extra-5.14.21-150400.24.111.2.s390x",
"product_id": "kernel-default-extra-5.14.21-150400.24.111.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"product": {
"name": "kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"product_id": "kernel-default-livepatch-5.14.21-150400.24.111.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"product": {
"name": "kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"product_id": "kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-5.14.21-150400.24.111.2.s390x",
"product": {
"name": "kernel-default-optional-5.14.21-150400.24.111.2.s390x",
"product_id": "kernel-default-optional-5.14.21-150400.24.111.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"product": {
"name": "kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"product_id": "kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"product": {
"name": "kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"product_id": "kernel-obs-build-5.14.21-150400.24.111.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.14.21-150400.24.111.1.s390x",
"product": {
"name": "kernel-obs-qa-5.14.21-150400.24.111.1.s390x",
"product_id": "kernel-obs-qa-5.14.21-150400.24.111.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.14.21-150400.24.111.1.s390x",
"product": {
"name": "kernel-syms-5.14.21-150400.24.111.1.s390x",
"product_id": "kernel-syms-5.14.21-150400.24.111.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"product": {
"name": "kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"product_id": "kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.14.21-150400.24.111.2.s390x",
"product": {
"name": "kselftests-kmp-default-5.14.21-150400.24.111.2.s390x",
"product_id": "kselftests-kmp-default-5.14.21-150400.24.111.2.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"product": {
"name": "ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"product_id": "ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"product": {
"name": "reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"product_id": "reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"product": {
"name": "cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"product_id": "cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"product": {
"name": "dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"product_id": "dlm-kmp-default-5.14.21-150400.24.111.2.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"product": {
"name": "gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"product_id": "gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-5.14.21-150400.24.111.2.x86_64",
"product": {
"name": "kernel-debug-5.14.21-150400.24.111.2.x86_64",
"product_id": "kernel-debug-5.14.21-150400.24.111.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-5.14.21-150400.24.111.2.x86_64",
"product": {
"name": "kernel-debug-devel-5.14.21-150400.24.111.2.x86_64",
"product_id": "kernel-debug-devel-5.14.21-150400.24.111.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"product": {
"name": "kernel-debug-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"product_id": "kernel-debug-livepatch-devel-5.14.21-150400.24.111.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-5.14.21-150400.24.111.2.x86_64",
"product": {
"name": "kernel-default-5.14.21-150400.24.111.2.x86_64",
"product_id": "kernel-default-5.14.21-150400.24.111.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"product": {
"name": "kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"product_id": "kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"product": {
"name": "kernel-default-base-rebuild-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"product_id": "kernel-default-base-rebuild-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"product": {
"name": "kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"product_id": "kernel-default-devel-5.14.21-150400.24.111.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.14.21-150400.24.111.2.x86_64",
"product": {
"name": "kernel-default-extra-5.14.21-150400.24.111.2.x86_64",
"product_id": "kernel-default-extra-5.14.21-150400.24.111.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"product": {
"name": "kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"product_id": "kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"product": {
"name": "kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"product_id": "kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-5.14.21-150400.24.111.2.x86_64",
"product": {
"name": "kernel-default-optional-5.14.21-150400.24.111.2.x86_64",
"product_id": "kernel-default-optional-5.14.21-150400.24.111.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-5.14.21-150400.24.111.2.x86_64",
"product": {
"name": "kernel-kvmsmall-5.14.21-150400.24.111.2.x86_64",
"product_id": "kernel-kvmsmall-5.14.21-150400.24.111.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-5.14.21-150400.24.111.2.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-5.14.21-150400.24.111.2.x86_64",
"product_id": "kernel-kvmsmall-devel-5.14.21-150400.24.111.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"product": {
"name": "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"product_id": "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.111.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"product": {
"name": "kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"product_id": "kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"product": {
"name": "kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"product_id": "kernel-obs-build-5.14.21-150400.24.111.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.14.21-150400.24.111.1.x86_64",
"product": {
"name": "kernel-obs-qa-5.14.21-150400.24.111.1.x86_64",
"product_id": "kernel-obs-qa-5.14.21-150400.24.111.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.14.21-150400.24.111.1.x86_64",
"product": {
"name": "kernel-syms-5.14.21-150400.24.111.1.x86_64",
"product_id": "kernel-syms-5.14.21-150400.24.111.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.14.21-150400.24.111.2.x86_64",
"product": {
"name": "kselftests-kmp-default-5.14.21-150400.24.111.2.x86_64",
"product_id": "kselftests-kmp-default-5.14.21-150400.24.111.2.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"product": {
"name": "ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"product_id": "ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"product": {
"name": "reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"product_id": "reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.3",
"product": {
"name": "SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-micro:5.3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.4",
"product": {
"name": "SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-micro:5.4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 15 SP4",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 15 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Manager Proxy 4.3",
"product": {
"name": "SUSE Manager Proxy 4.3",
"product_id": "SUSE Manager Proxy 4.3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-manager-proxy:4.3"
}
}
},
{
"category": "product_name",
"name": "SUSE Manager Server 4.3",
"product": {
"name": "SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-manager-server:4.3"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap Micro 5.3",
"product": {
"name": "openSUSE Leap Micro 5.3",
"product_id": "openSUSE Leap Micro 5.3",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap-micro:5.3"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap Micro 5.4",
"product": {
"name": "openSUSE Leap Micro 5.4",
"product_id": "openSUSE Leap Micro 5.4",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap-micro:5.4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.14.21-150400.24.111.2.aarch64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64"
},
"product_reference": "kernel-default-5.14.21-150400.24.111.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.14.21-150400.24.111.2.s390x as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x"
},
"product_reference": "kernel-default-5.14.21-150400.24.111.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.14.21-150400.24.111.2.x86_64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64"
},
"product_reference": "kernel-default-5.14.21-150400.24.111.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64"
},
"product_reference": "kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
},
"product_reference": "kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.14.21-150400.24.111.2.aarch64 as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64"
},
"product_reference": "kernel-default-5.14.21-150400.24.111.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.14.21-150400.24.111.2.s390x as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x"
},
"product_reference": "kernel-default-5.14.21-150400.24.111.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.14.21-150400.24.111.2.x86_64 as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64"
},
"product_reference": "kernel-default-5.14.21-150400.24.111.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64 as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64"
},
"product_reference": "kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64 as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
},
"product_reference": "kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le"
},
"product_reference": "kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.14.21-150400.24.111.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x"
},
"product_reference": "kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64"
},
"product_reference": "kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le"
},
"product_reference": "kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x"
},
"product_reference": "kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64"
},
"product_reference": "kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x"
},
"product_reference": "kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64"
},
"product_reference": "kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64"
},
"product_reference": "cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le"
},
"product_reference": "cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x"
},
"product_reference": "cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64"
},
"product_reference": "cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.14.21-150400.24.111.2.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64"
},
"product_reference": "dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le"
},
"product_reference": "dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.14.21-150400.24.111.2.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x"
},
"product_reference": "dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.14.21-150400.24.111.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64"
},
"product_reference": "dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64"
},
"product_reference": "gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le"
},
"product_reference": "gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.14.21-150400.24.111.2.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x"
},
"product_reference": "gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64"
},
"product_reference": "gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64"
},
"product_reference": "ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le"
},
"product_reference": "ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x"
},
"product_reference": "ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64"
},
"product_reference": "ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-5.14.21-150400.24.111.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64"
},
"product_reference": "kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64"
},
"product_reference": "kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.14.21-150400.24.111.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64"
},
"product_reference": "kernel-default-5.14.21-150400.24.111.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.14.21-150400.24.111.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64"
},
"product_reference": "kernel-default-5.14.21-150400.24.111.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64"
},
"product_reference": "kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
},
"product_reference": "kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.14.21-150400.24.111.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64"
},
"product_reference": "kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.14.21-150400.24.111.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64"
},
"product_reference": "kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.14.21-150400.24.111.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch"
},
"product_reference": "kernel-devel-5.14.21-150400.24.111.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-5.14.21-150400.24.111.2.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch"
},
"product_reference": "kernel-docs-5.14.21-150400.24.111.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.14.21-150400.24.111.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch"
},
"product_reference": "kernel-macros-5.14.21-150400.24.111.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.14.21-150400.24.111.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64"
},
"product_reference": "kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.14.21-150400.24.111.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64"
},
"product_reference": "kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.14.21-150400.24.111.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch"
},
"product_reference": "kernel-source-5.14.21-150400.24.111.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.14.21-150400.24.111.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64"
},
"product_reference": "kernel-syms-5.14.21-150400.24.111.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.14.21-150400.24.111.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64"
},
"product_reference": "kernel-syms-5.14.21-150400.24.111.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64"
},
"product_reference": "reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64"
},
"product_reference": "reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-5.14.21-150400.24.111.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64"
},
"product_reference": "kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64"
},
"product_reference": "kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.14.21-150400.24.111.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64"
},
"product_reference": "kernel-default-5.14.21-150400.24.111.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.14.21-150400.24.111.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64"
},
"product_reference": "kernel-default-5.14.21-150400.24.111.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64"
},
"product_reference": "kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
},
"product_reference": "kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.14.21-150400.24.111.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64"
},
"product_reference": "kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.14.21-150400.24.111.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64"
},
"product_reference": "kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.14.21-150400.24.111.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch"
},
"product_reference": "kernel-devel-5.14.21-150400.24.111.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-5.14.21-150400.24.111.2.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch"
},
"product_reference": "kernel-docs-5.14.21-150400.24.111.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.14.21-150400.24.111.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch"
},
"product_reference": "kernel-macros-5.14.21-150400.24.111.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.14.21-150400.24.111.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64"
},
"product_reference": "kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.14.21-150400.24.111.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64"
},
"product_reference": "kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.14.21-150400.24.111.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch"
},
"product_reference": "kernel-source-5.14.21-150400.24.111.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.14.21-150400.24.111.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64"
},
"product_reference": "kernel-syms-5.14.21-150400.24.111.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.14.21-150400.24.111.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64"
},
"product_reference": "kernel-syms-5.14.21-150400.24.111.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64"
},
"product_reference": "reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64"
},
"product_reference": "reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-5.14.21-150400.24.111.2.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64"
},
"product_reference": "kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64"
},
"product_reference": "kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.14.21-150400.24.111.2.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64"
},
"product_reference": "kernel-default-5.14.21-150400.24.111.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.14.21-150400.24.111.2.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le"
},
"product_reference": "kernel-default-5.14.21-150400.24.111.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.14.21-150400.24.111.2.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x"
},
"product_reference": "kernel-default-5.14.21-150400.24.111.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.14.21-150400.24.111.2.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64"
},
"product_reference": "kernel-default-5.14.21-150400.24.111.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64"
},
"product_reference": "kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le"
},
"product_reference": "kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
},
"product_reference": "kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.14.21-150400.24.111.2.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64"
},
"product_reference": "kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.14.21-150400.24.111.2.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le"
},
"product_reference": "kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.14.21-150400.24.111.2.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x"
},
"product_reference": "kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.14.21-150400.24.111.2.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64"
},
"product_reference": "kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.14.21-150400.24.111.1.noarch as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch"
},
"product_reference": "kernel-devel-5.14.21-150400.24.111.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-5.14.21-150400.24.111.2.noarch as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch"
},
"product_reference": "kernel-docs-5.14.21-150400.24.111.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.14.21-150400.24.111.1.noarch as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch"
},
"product_reference": "kernel-macros-5.14.21-150400.24.111.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.14.21-150400.24.111.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64"
},
"product_reference": "kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.14.21-150400.24.111.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le"
},
"product_reference": "kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.14.21-150400.24.111.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x"
},
"product_reference": "kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.14.21-150400.24.111.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64"
},
"product_reference": "kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.14.21-150400.24.111.1.noarch as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch"
},
"product_reference": "kernel-source-5.14.21-150400.24.111.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.14.21-150400.24.111.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64"
},
"product_reference": "kernel-syms-5.14.21-150400.24.111.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.14.21-150400.24.111.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le"
},
"product_reference": "kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.14.21-150400.24.111.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x"
},
"product_reference": "kernel-syms-5.14.21-150400.24.111.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.14.21-150400.24.111.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64"
},
"product_reference": "kernel-syms-5.14.21-150400.24.111.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-5.14.21-150400.24.111.2.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
},
"product_reference": "kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64"
},
"product_reference": "reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le"
},
"product_reference": "reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x"
},
"product_reference": "reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64"
},
"product_reference": "reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.14.21-150400.24.111.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le"
},
"product_reference": "kernel-default-5.14.21-150400.24.111.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.14.21-150400.24.111.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64"
},
"product_reference": "kernel-default-5.14.21-150400.24.111.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le"
},
"product_reference": "kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
},
"product_reference": "kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.14.21-150400.24.111.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le"
},
"product_reference": "kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.14.21-150400.24.111.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64"
},
"product_reference": "kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.14.21-150400.24.111.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch"
},
"product_reference": "kernel-devel-5.14.21-150400.24.111.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-5.14.21-150400.24.111.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch"
},
"product_reference": "kernel-docs-5.14.21-150400.24.111.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.14.21-150400.24.111.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch"
},
"product_reference": "kernel-macros-5.14.21-150400.24.111.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.14.21-150400.24.111.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le"
},
"product_reference": "kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.14.21-150400.24.111.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64"
},
"product_reference": "kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.14.21-150400.24.111.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch"
},
"product_reference": "kernel-source-5.14.21-150400.24.111.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.14.21-150400.24.111.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le"
},
"product_reference": "kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.14.21-150400.24.111.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64"
},
"product_reference": "kernel-syms-5.14.21-150400.24.111.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le"
},
"product_reference": "reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64"
},
"product_reference": "reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.14.21-150400.24.111.2.x86_64 as component of SUSE Manager Proxy 4.3",
"product_id": "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64"
},
"product_reference": "kernel-default-5.14.21-150400.24.111.2.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64 as component of SUSE Manager Proxy 4.3",
"product_id": "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
},
"product_reference": "kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.14.21-150400.24.111.2.x86_64 as component of SUSE Manager Proxy 4.3",
"product_id": "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64"
},
"product_reference": "kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.14.21-150400.24.111.1.noarch as component of SUSE Manager Proxy 4.3",
"product_id": "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch"
},
"product_reference": "kernel-devel-5.14.21-150400.24.111.1.noarch",
"relates_to_product_reference": "SUSE Manager Proxy 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.14.21-150400.24.111.1.noarch as component of SUSE Manager Proxy 4.3",
"product_id": "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch"
},
"product_reference": "kernel-macros-5.14.21-150400.24.111.1.noarch",
"relates_to_product_reference": "SUSE Manager Proxy 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.14.21-150400.24.111.1.noarch as component of SUSE Manager Proxy 4.3",
"product_id": "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch"
},
"product_reference": "kernel-source-5.14.21-150400.24.111.1.noarch",
"relates_to_product_reference": "SUSE Manager Proxy 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.14.21-150400.24.111.1.x86_64 as component of SUSE Manager Proxy 4.3",
"product_id": "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64"
},
"product_reference": "kernel-syms-5.14.21-150400.24.111.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.14.21-150400.24.111.2.ppc64le as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le"
},
"product_reference": "kernel-default-5.14.21-150400.24.111.2.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.14.21-150400.24.111.2.s390x as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x"
},
"product_reference": "kernel-default-5.14.21-150400.24.111.2.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.14.21-150400.24.111.2.x86_64 as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64"
},
"product_reference": "kernel-default-5.14.21-150400.24.111.2.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le"
},
"product_reference": "kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64 as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
},
"product_reference": "kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.14.21-150400.24.111.2.ppc64le as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le"
},
"product_reference": "kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.14.21-150400.24.111.2.s390x as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x"
},
"product_reference": "kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.14.21-150400.24.111.2.x86_64 as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64"
},
"product_reference": "kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.14.21-150400.24.111.1.noarch as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch"
},
"product_reference": "kernel-devel-5.14.21-150400.24.111.1.noarch",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.14.21-150400.24.111.1.noarch as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch"
},
"product_reference": "kernel-macros-5.14.21-150400.24.111.1.noarch",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.14.21-150400.24.111.1.noarch as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch"
},
"product_reference": "kernel-source-5.14.21-150400.24.111.1.noarch",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.14.21-150400.24.111.1.ppc64le as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le"
},
"product_reference": "kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.14.21-150400.24.111.1.s390x as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x"
},
"product_reference": "kernel-syms-5.14.21-150400.24.111.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.14.21-150400.24.111.1.x86_64 as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64"
},
"product_reference": "kernel-syms-5.14.21-150400.24.111.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-5.14.21-150400.24.111.2.s390x as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x"
},
"product_reference": "kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.14.21-150400.24.111.2.aarch64 as component of openSUSE Leap Micro 5.3",
"product_id": "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64"
},
"product_reference": "kernel-default-5.14.21-150400.24.111.2.aarch64",
"relates_to_product_reference": "openSUSE Leap Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.14.21-150400.24.111.2.x86_64 as component of openSUSE Leap Micro 5.3",
"product_id": "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64"
},
"product_reference": "kernel-default-5.14.21-150400.24.111.2.x86_64",
"relates_to_product_reference": "openSUSE Leap Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64 as component of openSUSE Leap Micro 5.3",
"product_id": "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64"
},
"product_reference": "kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"relates_to_product_reference": "openSUSE Leap Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64 as component of openSUSE Leap Micro 5.3",
"product_id": "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
},
"product_reference": "kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"relates_to_product_reference": "openSUSE Leap Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.14.21-150400.24.111.2.aarch64 as component of openSUSE Leap Micro 5.4",
"product_id": "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64"
},
"product_reference": "kernel-default-5.14.21-150400.24.111.2.aarch64",
"relates_to_product_reference": "openSUSE Leap Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.14.21-150400.24.111.2.s390x as component of openSUSE Leap Micro 5.4",
"product_id": "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x"
},
"product_reference": "kernel-default-5.14.21-150400.24.111.2.s390x",
"relates_to_product_reference": "openSUSE Leap Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.14.21-150400.24.111.2.x86_64 as component of openSUSE Leap Micro 5.4",
"product_id": "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64"
},
"product_reference": "kernel-default-5.14.21-150400.24.111.2.x86_64",
"relates_to_product_reference": "openSUSE Leap Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64 as component of openSUSE Leap Micro 5.4",
"product_id": "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64"
},
"product_reference": "kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"relates_to_product_reference": "openSUSE Leap Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64 as component of openSUSE Leap Micro 5.4",
"product_id": "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
},
"product_reference": "kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"relates_to_product_reference": "openSUSE Leap Micro 5.4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-25162",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-25162"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ni2c: Fix a potential use after free\n\nFree the adap structure only after we are done using it.\nThis patch just moves the put_device() down a bit to avoid the\nuse after free.\n\n[wsa: added comment to the code, added Fixes tag]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-25162",
"url": "https://www.suse.com/security/cve/CVE-2019-25162"
},
{
"category": "external",
"summary": "SUSE Bug 1220409 for CVE-2019-25162",
"url": "https://bugzilla.suse.com/1220409"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-14T16:47:20Z",
"details": "moderate"
}
],
"title": "CVE-2019-25162"
},
{
"cve": "CVE-2021-46923",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-46923"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs/mount_setattr: always cleanup mount_kattr\n\nMake sure that finish_mount_kattr() is called after mount_kattr was\nsuccesfully built in both the success and failure case to prevent\nleaking any references we took when we built it. We returned early if\npath lookup failed thereby risking to leak an additional reference we\ntook when building mount_kattr when an idmapped mount was requested.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-46923",
"url": "https://www.suse.com/security/cve/CVE-2021-46923"
},
{
"category": "external",
"summary": "SUSE Bug 1220457 for CVE-2021-46923",
"url": "https://bugzilla.suse.com/1220457"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-14T16:47:20Z",
"details": "low"
}
],
"title": "CVE-2021-46923"
},
{
"cve": "CVE-2021-46924",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-46924"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFC: st21nfca: Fix memory leak in device probe and remove\n\n\u0027phy-\u003epending_skb\u0027 is alloced when device probe, but forgot to free\nin the error handling path and remove path, this cause memory leak\nas follows:\n\nunreferenced object 0xffff88800bc06800 (size 512):\n comm \"8\", pid 11775, jiffies 4295159829 (age 9.032s)\n hex dump (first 32 bytes):\n 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\n 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\n backtrace:\n [\u003c00000000d66c09ce\u003e] __kmalloc_node_track_caller+0x1ed/0x450\n [\u003c00000000c93382b3\u003e] kmalloc_reserve+0x37/0xd0\n [\u003c000000005fea522c\u003e] __alloc_skb+0x124/0x380\n [\u003c0000000019f29f9a\u003e] st21nfca_hci_i2c_probe+0x170/0x8f2\n\nFix it by freeing \u0027pending_skb\u0027 in error and remove.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-46924",
"url": "https://www.suse.com/security/cve/CVE-2021-46924"
},
{
"category": "external",
"summary": "SUSE Bug 1220459 for CVE-2021-46924",
"url": "https://bugzilla.suse.com/1220459"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-14T16:47:20Z",
"details": "moderate"
}
],
"title": "CVE-2021-46924"
},
{
"cve": "CVE-2021-46932",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-46932"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nInput: appletouch - initialize work before device registration\n\nSyzbot has reported warning in __flush_work(). This warning is caused by\nwork-\u003efunc == NULL, which means missing work initialization.\n\nThis may happen, since input_dev-\u003eclose() calls\ncancel_work_sync(\u0026dev-\u003ework), but dev-\u003ework initalization happens _after_\ninput_register_device() call.\n\nSo this patch moves dev-\u003ework initialization before registering input\ndevice",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-46932",
"url": "https://www.suse.com/security/cve/CVE-2021-46932"
},
{
"category": "external",
"summary": "SUSE Bug 1220444 for CVE-2021-46932",
"url": "https://bugzilla.suse.com/1220444"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-14T16:47:20Z",
"details": "moderate"
}
],
"title": "CVE-2021-46932"
},
{
"cve": "CVE-2021-46934",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-46934"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ni2c: validate user data in compat ioctl\n\nWrong user data may cause warning in i2c_transfer(), ex: zero msgs.\nUserspace should not be able to trigger warnings, so this patch adds\nvalidation checks for user data in compact ioctl to prevent reported\nwarnings",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-46934",
"url": "https://www.suse.com/security/cve/CVE-2021-46934"
},
{
"category": "external",
"summary": "SUSE Bug 1220469 for CVE-2021-46934",
"url": "https://bugzilla.suse.com/1220469"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-14T16:47:20Z",
"details": "low"
}
],
"title": "CVE-2021-46934"
},
{
"cve": "CVE-2021-47083",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47083"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npinctrl: mediatek: fix global-out-of-bounds issue\n\nWhen eint virtual eint number is greater than gpio number,\nit maybe produce \u0027desc[eint_n]\u0027 size globle-out-of-bounds issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47083",
"url": "https://www.suse.com/security/cve/CVE-2021-47083"
},
{
"category": "external",
"summary": "SUSE Bug 1220917 for CVE-2021-47083",
"url": "https://bugzilla.suse.com/1220917"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-14T16:47:20Z",
"details": "moderate"
}
],
"title": "CVE-2021-47083"
},
{
"cve": "CVE-2022-48627",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48627"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvt: fix memory overlapping when deleting chars in the buffer\n\nA memory overlapping copy occurs when deleting a long line. This memory\noverlapping copy can cause data corruption when scr_memcpyw is optimized\nto memcpy because memcpy does not ensure its behavior if the destination\nbuffer overlaps with the source buffer. The line buffer is not always\nbroken, because the memcpy utilizes the hardware acceleration, whose\nresult is not deterministic.\n\nFix this problem by using replacing the scr_memcpyw with scr_memmovew.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48627",
"url": "https://www.suse.com/security/cve/CVE-2022-48627"
},
{
"category": "external",
"summary": "SUSE Bug 1220845 for CVE-2022-48627",
"url": "https://bugzilla.suse.com/1220845"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-14T16:47:20Z",
"details": "moderate"
}
],
"title": "CVE-2022-48627"
},
{
"cve": "CVE-2023-28746",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-28746"
}
],
"notes": [
{
"category": "general",
"text": "Information exposure through microarchitectural state after transient execution from some register files for some Intel(R) Atom(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-28746",
"url": "https://www.suse.com/security/cve/CVE-2023-28746"
},
{
"category": "external",
"summary": "SUSE Bug 1213456 for CVE-2023-28746",
"url": "https://bugzilla.suse.com/1213456"
},
{
"category": "external",
"summary": "SUSE Bug 1221323 for CVE-2023-28746",
"url": "https://bugzilla.suse.com/1221323"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-14T16:47:20Z",
"details": "moderate"
}
],
"title": "CVE-2023-28746"
},
{
"cve": "CVE-2023-5197",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-5197"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free vulnerability in the Linux kernel\u0027s netfilter: nf_tables component can be exploited to achieve local privilege escalation.\n\nAddition and removal of rules from chain bindings within the same transaction causes leads to use-after-free.\n\nWe recommend upgrading past commit f15f29fd4779be8a418b66e9d52979bb6d6c2325.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-5197",
"url": "https://www.suse.com/security/cve/CVE-2023-5197"
},
{
"category": "external",
"summary": "SUSE Bug 1218216 for CVE-2023-5197",
"url": "https://bugzilla.suse.com/1218216"
},
{
"category": "external",
"summary": "SUSE Bug 1245974 for CVE-2023-5197",
"url": "https://bugzilla.suse.com/1245974"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-14T16:47:20Z",
"details": "important"
}
],
"title": "CVE-2023-5197"
},
{
"cve": "CVE-2023-52340",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52340"
}
],
"notes": [
{
"category": "general",
"text": "The IPv6 implementation in the Linux kernel before 6.3 has a net/ipv6/route.c max_size threshold that can be consumed easily, e.g., leading to a denial of service (network is unreachable errors) when IPv6 packets are sent in a loop via a raw socket.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52340",
"url": "https://www.suse.com/security/cve/CVE-2023-52340"
},
{
"category": "external",
"summary": "SUSE Bug 1219295 for CVE-2023-52340",
"url": "https://bugzilla.suse.com/1219295"
},
{
"category": "external",
"summary": "SUSE Bug 1219296 for CVE-2023-52340",
"url": "https://bugzilla.suse.com/1219296"
},
{
"category": "external",
"summary": "SUSE Bug 1224298 for CVE-2023-52340",
"url": "https://bugzilla.suse.com/1224298"
},
{
"category": "external",
"summary": "SUSE Bug 1224878 for CVE-2023-52340",
"url": "https://bugzilla.suse.com/1224878"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-14T16:47:20Z",
"details": "important"
}
],
"title": "CVE-2023-52340"
},
{
"cve": "CVE-2023-52429",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52429"
}
],
"notes": [
{
"category": "general",
"text": "dm_table_create in drivers/md/dm-table.c in the Linux kernel through 6.7.4 can attempt to (in alloc_targets) allocate more than INT_MAX bytes, and crash, because of a missing check for struct dm_ioctl.target_count.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52429",
"url": "https://www.suse.com/security/cve/CVE-2023-52429"
},
{
"category": "external",
"summary": "SUSE Bug 1219827 for CVE-2023-52429",
"url": "https://bugzilla.suse.com/1219827"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-14T16:47:20Z",
"details": "moderate"
}
],
"title": "CVE-2023-52429"
},
{
"cve": "CVE-2023-52439",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52439"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nuio: Fix use-after-free in uio_open\n\ncore-1\t\t\t\tcore-2\n-------------------------------------------------------\nuio_unregister_device\t\tuio_open\n\t\t\t\tidev = idr_find()\ndevice_unregister(\u0026idev-\u003edev)\nput_device(\u0026idev-\u003edev)\nuio_device_release\n\t\t\t\tget_device(\u0026idev-\u003edev)\nkfree(idev)\nuio_free_minor(minor)\n\t\t\t\tuio_release\n\t\t\t\tput_device(\u0026idev-\u003edev)\n\t\t\t\tkfree(idev)\n-------------------------------------------------------\n\nIn the core-1 uio_unregister_device(), the device_unregister will kfree\nidev when the idev-\u003edev kobject ref is 1. But after core-1\ndevice_unregister, put_device and before doing kfree, the core-2 may\nget_device. Then:\n1. After core-1 kfree idev, the core-2 will do use-after-free for idev.\n2. When core-2 do uio_release and put_device, the idev will be double\n freed.\n\nTo address this issue, we can get idev atomic \u0026 inc idev reference with\nminor_lock.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52439",
"url": "https://www.suse.com/security/cve/CVE-2023-52439"
},
{
"category": "external",
"summary": "SUSE Bug 1220140 for CVE-2023-52439",
"url": "https://bugzilla.suse.com/1220140"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-14T16:47:20Z",
"details": "moderate"
}
],
"title": "CVE-2023-52439"
},
{
"cve": "CVE-2023-52443",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52443"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\napparmor: avoid crash when parsed profile name is empty\n\nWhen processing a packed profile in unpack_profile() described like\n\n \"profile :ns::samba-dcerpcd /usr/lib*/samba/{,samba/}samba-dcerpcd {...}\"\n\na string \":samba-dcerpcd\" is unpacked as a fully-qualified name and then\npassed to aa_splitn_fqname().\n\naa_splitn_fqname() treats \":samba-dcerpcd\" as only containing a namespace.\nThus it returns NULL for tmpname, meanwhile tmpns is non-NULL. Later\naa_alloc_profile() crashes as the new profile name is NULL now.\n\ngeneral protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN NOPTI\nKASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007]\nCPU: 6 PID: 1657 Comm: apparmor_parser Not tainted 6.7.0-rc2-dirty #16\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.2-3-gd478f380-rebuilt.opensuse.org 04/01/2014\nRIP: 0010:strlen+0x1e/0xa0\nCall Trace:\n \u003cTASK\u003e\n ? strlen+0x1e/0xa0\n aa_policy_init+0x1bb/0x230\n aa_alloc_profile+0xb1/0x480\n unpack_profile+0x3bc/0x4960\n aa_unpack+0x309/0x15e0\n aa_replace_profiles+0x213/0x33c0\n policy_update+0x261/0x370\n profile_replace+0x20e/0x2a0\n vfs_write+0x2af/0xe00\n ksys_write+0x126/0x250\n do_syscall_64+0x46/0xf0\n entry_SYSCALL_64_after_hwframe+0x6e/0x76\n \u003c/TASK\u003e\n---[ end trace 0000000000000000 ]---\nRIP: 0010:strlen+0x1e/0xa0\n\nIt seems such behaviour of aa_splitn_fqname() is expected and checked in\nother places where it is called (e.g. aa_remove_profiles). Well, there\nis an explicit comment \"a ns name without a following profile is allowed\"\ninside.\n\nAFAICS, nothing can prevent unpacked \"name\" to be in form like\n\":samba-dcerpcd\" - it is passed from userspace.\n\nDeny the whole profile set replacement in such case and inform user with\nEPROTO and an explaining message.\n\nFound by Linux Verification Center (linuxtesting.org).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52443",
"url": "https://www.suse.com/security/cve/CVE-2023-52443"
},
{
"category": "external",
"summary": "SUSE Bug 1220240 for CVE-2023-52443",
"url": "https://bugzilla.suse.com/1220240"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-14T16:47:20Z",
"details": "moderate"
}
],
"title": "CVE-2023-52443"
},
{
"cve": "CVE-2023-52445",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52445"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: pvrusb2: fix use after free on context disconnection\n\nUpon module load, a kthread is created targeting the\npvr2_context_thread_func function, which may call pvr2_context_destroy\nand thus call kfree() on the context object. However, that might happen\nbefore the usb hub_event handler is able to notify the driver. This\npatch adds a sanity check before the invalid read reported by syzbot,\nwithin the context disconnection call stack.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52445",
"url": "https://www.suse.com/security/cve/CVE-2023-52445"
},
{
"category": "external",
"summary": "SUSE Bug 1220241 for CVE-2023-52445",
"url": "https://bugzilla.suse.com/1220241"
},
{
"category": "external",
"summary": "SUSE Bug 1220315 for CVE-2023-52445",
"url": "https://bugzilla.suse.com/1220315"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-14T16:47:20Z",
"details": "moderate"
}
],
"title": "CVE-2023-52445"
},
{
"cve": "CVE-2023-52447",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52447"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Defer the free of inner map when necessary\n\nWhen updating or deleting an inner map in map array or map htab, the map\nmay still be accessed by non-sleepable program or sleepable program.\nHowever bpf_map_fd_put_ptr() decreases the ref-counter of the inner map\ndirectly through bpf_map_put(), if the ref-counter is the last one\n(which is true for most cases), the inner map will be freed by\nops-\u003emap_free() in a kworker. But for now, most .map_free() callbacks\ndon\u0027t use synchronize_rcu() or its variants to wait for the elapse of a\nRCU grace period, so after the invocation of ops-\u003emap_free completes,\nthe bpf program which is accessing the inner map may incur\nuse-after-free problem.\n\nFix the free of inner map by invoking bpf_map_free_deferred() after both\none RCU grace period and one tasks trace RCU grace period if the inner\nmap has been removed from the outer map before. The deferment is\naccomplished by using call_rcu() or call_rcu_tasks_trace() when\nreleasing the last ref-counter of bpf map. The newly-added rcu_head\nfield in bpf_map shares the same storage space with work field to\nreduce the size of bpf_map.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52447",
"url": "https://www.suse.com/security/cve/CVE-2023-52447"
},
{
"category": "external",
"summary": "SUSE Bug 1220251 for CVE-2023-52447",
"url": "https://bugzilla.suse.com/1220251"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-14T16:47:20Z",
"details": "moderate"
}
],
"title": "CVE-2023-52447"
},
{
"cve": "CVE-2023-52448",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52448"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ngfs2: Fix kernel NULL pointer dereference in gfs2_rgrp_dump\n\nSyzkaller has reported a NULL pointer dereference when accessing\nrgd-\u003erd_rgl in gfs2_rgrp_dump(). This can happen when creating\nrgd-\u003erd_gl fails in read_rindex_entry(). Add a NULL pointer check in\ngfs2_rgrp_dump() to prevent that.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52448",
"url": "https://www.suse.com/security/cve/CVE-2023-52448"
},
{
"category": "external",
"summary": "SUSE Bug 1220253 for CVE-2023-52448",
"url": "https://bugzilla.suse.com/1220253"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-14T16:47:20Z",
"details": "moderate"
}
],
"title": "CVE-2023-52448"
},
{
"cve": "CVE-2023-52449",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52449"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmtd: Fix gluebi NULL pointer dereference caused by ftl notifier\n\nIf both ftl.ko and gluebi.ko are loaded, the notifier of ftl\ntriggers NULL pointer dereference when trying to access\n\u0027gluebi-\u003edesc\u0027 in gluebi_read().\n\nubi_gluebi_init\n ubi_register_volume_notifier\n ubi_enumerate_volumes\n ubi_notify_all\n gluebi_notify nb-\u003enotifier_call()\n gluebi_create\n mtd_device_register\n mtd_device_parse_register\n add_mtd_device\n blktrans_notify_add not-\u003eadd()\n ftl_add_mtd tr-\u003eadd_mtd()\n scan_header\n mtd_read\n mtd_read_oob\n mtd_read_oob_std\n gluebi_read mtd-\u003eread()\n gluebi-\u003edesc - NULL\n\nDetailed reproduction information available at the Link [1],\n\nIn the normal case, obtain gluebi-\u003edesc in the gluebi_get_device(),\nand access gluebi-\u003edesc in the gluebi_read(). However,\ngluebi_get_device() is not executed in advance in the\nftl_add_mtd() process, which leads to NULL pointer dereference.\n\nThe solution for the gluebi module is to run jffs2 on the UBI\nvolume without considering working with ftl or mtdblock [2].\nTherefore, this problem can be avoided by preventing gluebi from\ncreating the mtdblock device after creating mtd partition of the\ntype MTD_UBIVOLUME.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52449",
"url": "https://www.suse.com/security/cve/CVE-2023-52449"
},
{
"category": "external",
"summary": "SUSE Bug 1220238 for CVE-2023-52449",
"url": "https://bugzilla.suse.com/1220238"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-14T16:47:20Z",
"details": "moderate"
}
],
"title": "CVE-2023-52449"
},
{
"cve": "CVE-2023-52451",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52451"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/pseries/memhp: Fix access beyond end of drmem array\n\ndlpar_memory_remove_by_index() may access beyond the bounds of the\ndrmem lmb array when the LMB lookup fails to match an entry with the\ngiven DRC index. When the search fails, the cursor is left pointing to\n\u0026drmem_info-\u003elmbs[drmem_info-\u003en_lmbs], which is one element past the\nlast valid entry in the array. The debug message at the end of the\nfunction then dereferences this pointer:\n\n pr_debug(\"Failed to hot-remove memory at %llx\\n\",\n lmb-\u003ebase_addr);\n\nThis was found by inspection and confirmed with KASAN:\n\n pseries-hotplug-mem: Attempting to hot-remove LMB, drc index 1234\n ==================================================================\n BUG: KASAN: slab-out-of-bounds in dlpar_memory+0x298/0x1658\n Read of size 8 at addr c000000364e97fd0 by task bash/949\n\n dump_stack_lvl+0xa4/0xfc (unreliable)\n print_report+0x214/0x63c\n kasan_report+0x140/0x2e0\n __asan_load8+0xa8/0xe0\n dlpar_memory+0x298/0x1658\n handle_dlpar_errorlog+0x130/0x1d0\n dlpar_store+0x18c/0x3e0\n kobj_attr_store+0x68/0xa0\n sysfs_kf_write+0xc4/0x110\n kernfs_fop_write_iter+0x26c/0x390\n vfs_write+0x2d4/0x4e0\n ksys_write+0xac/0x1a0\n system_call_exception+0x268/0x530\n system_call_vectored_common+0x15c/0x2ec\n\n Allocated by task 1:\n kasan_save_stack+0x48/0x80\n kasan_set_track+0x34/0x50\n kasan_save_alloc_info+0x34/0x50\n __kasan_kmalloc+0xd0/0x120\n __kmalloc+0x8c/0x320\n kmalloc_array.constprop.0+0x48/0x5c\n drmem_init+0x2a0/0x41c\n do_one_initcall+0xe0/0x5c0\n kernel_init_freeable+0x4ec/0x5a0\n kernel_init+0x30/0x1e0\n ret_from_kernel_user_thread+0x14/0x1c\n\n The buggy address belongs to the object at c000000364e80000\n which belongs to the cache kmalloc-128k of size 131072\n The buggy address is located 0 bytes to the right of\n allocated 98256-byte region [c000000364e80000, c000000364e97fd0)\n\n ==================================================================\n pseries-hotplug-mem: Failed to hot-remove memory at 0\n\nLog failed lookups with a separate message and dereference the\ncursor only when it points to a valid entry.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52451",
"url": "https://www.suse.com/security/cve/CVE-2023-52451"
},
{
"category": "external",
"summary": "SUSE Bug 1220250 for CVE-2023-52451",
"url": "https://bugzilla.suse.com/1220250"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-14T16:47:20Z",
"details": "moderate"
}
],
"title": "CVE-2023-52451"
},
{
"cve": "CVE-2023-52452",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52452"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Fix accesses to uninit stack slots\n\nPrivileged programs are supposed to be able to read uninitialized stack\nmemory (ever since 6715df8d5) but, before this patch, these accesses\nwere permitted inconsistently. In particular, accesses were permitted\nabove state-\u003eallocated_stack, but not below it. In other words, if the\nstack was already \"large enough\", the access was permitted, but\notherwise the access was rejected instead of being allowed to \"grow the\nstack\". This undesired rejection was happening in two places:\n- in check_stack_slot_within_bounds()\n- in check_stack_range_initialized()\nThis patch arranges for these accesses to be permitted. A bunch of tests\nthat were relying on the old rejection had to change; all of them were\nchanged to add also run unprivileged, in which case the old behavior\npersists. One tests couldn\u0027t be updated - global_func16 - because it\ncan\u0027t run unprivileged for other reasons.\n\nThis patch also fixes the tracking of the stack size for variable-offset\nreads. This second fix is bundled in the same commit as the first one\nbecause they\u0027re inter-related. Before this patch, writes to the stack\nusing registers containing a variable offset (as opposed to registers\nwith fixed, known values) were not properly contributing to the\nfunction\u0027s needed stack size. As a result, it was possible for a program\nto verify, but then to attempt to read out-of-bounds data at runtime\nbecause a too small stack had been allocated for it.\n\nEach function tracks the size of the stack it needs in\nbpf_subprog_info.stack_depth, which is maintained by\nupdate_stack_depth(). For regular memory accesses, check_mem_access()\nwas calling update_state_depth() but it was passing in only the fixed\npart of the offset register, ignoring the variable offset. This was\nincorrect; the minimum possible value of that register should be used\ninstead.\n\nThis tracking is now fixed by centralizing the tracking of stack size in\ngrow_stack_state(), and by lifting the calls to grow_stack_state() to\ncheck_stack_access_within_bounds() as suggested by Andrii. The code is\nnow simpler and more convincingly tracks the correct maximum stack size.\ncheck_stack_range_initialized() can now rely on enough stack having been\nallocated for the access; this helps with the fix for the first issue.\n\nA few tests were changed to also check the stack depth computation. The\none that fails without this patch is verifier_var_off:stack_write_priv_vs_unpriv.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52452",
"url": "https://www.suse.com/security/cve/CVE-2023-52452"
},
{
"category": "external",
"summary": "SUSE Bug 1220257 for CVE-2023-52452",
"url": "https://bugzilla.suse.com/1220257"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-14T16:47:20Z",
"details": "moderate"
}
],
"title": "CVE-2023-52452"
},
{
"cve": "CVE-2023-52456",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52456"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nserial: imx: fix tx statemachine deadlock\n\nWhen using the serial port as RS485 port, the tx statemachine is used to\ncontrol the RTS pin to drive the RS485 transceiver TX_EN pin. When the\nTTY port is closed in the middle of a transmission (for instance during\nuserland application crash), imx_uart_shutdown disables the interface\nand disables the Transmission Complete interrupt. afer that,\nimx_uart_stop_tx bails on an incomplete transmission, to be retriggered\nby the TC interrupt. This interrupt is disabled and therefore the tx\nstatemachine never transitions out of SEND. The statemachine is in\ndeadlock now, and the TX_EN remains low, making the interface useless.\n\nimx_uart_stop_tx now checks for incomplete transmission AND whether TC\ninterrupts are enabled before bailing to be retriggered. This makes sure\nthe state machine handling is reached, and is properly set to\nWAIT_AFTER_SEND.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52456",
"url": "https://www.suse.com/security/cve/CVE-2023-52456"
},
{
"category": "external",
"summary": "SUSE Bug 1220364 for CVE-2023-52456",
"url": "https://bugzilla.suse.com/1220364"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-14T16:47:20Z",
"details": "moderate"
}
],
"title": "CVE-2023-52456"
},
{
"cve": "CVE-2023-52457",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52457"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nserial: 8250: omap: Don\u0027t skip resource freeing if pm_runtime_resume_and_get() failed\n\nReturning an error code from .remove() makes the driver core emit the\nlittle helpful error message:\n\n\tremove callback returned a non-zero value. This will be ignored.\n\nand then remove the device anyhow. So all resources that were not freed\nare leaked in this case. Skipping serial8250_unregister_port() has the\npotential to keep enough of the UART around to trigger a use-after-free.\n\nSo replace the error return (and with it the little helpful error\nmessage) by a more useful error message and continue to cleanup.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52457",
"url": "https://www.suse.com/security/cve/CVE-2023-52457"
},
{
"category": "external",
"summary": "SUSE Bug 1220350 for CVE-2023-52457",
"url": "https://bugzilla.suse.com/1220350"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-14T16:47:20Z",
"details": "moderate"
}
],
"title": "CVE-2023-52457"
},
{
"cve": "CVE-2023-52463",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52463"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nefivarfs: force RO when remounting if SetVariable is not supported\n\nIf SetVariable at runtime is not supported by the firmware we never assign\na callback for that function. At the same time mount the efivarfs as\nRO so no one can call that. However, we never check the permission flags\nwhen someone remounts the filesystem as RW. As a result this leads to a\ncrash looking like this:\n\n$ mount -o remount,rw /sys/firmware/efi/efivars\n$ efi-updatevar -f PK.auth PK\n\n[ 303.279166] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000000\n[ 303.280482] Mem abort info:\n[ 303.280854] ESR = 0x0000000086000004\n[ 303.281338] EC = 0x21: IABT (current EL), IL = 32 bits\n[ 303.282016] SET = 0, FnV = 0\n[ 303.282414] EA = 0, S1PTW = 0\n[ 303.282821] FSC = 0x04: level 0 translation fault\n[ 303.283771] user pgtable: 4k pages, 48-bit VAs, pgdp=000000004258c000\n[ 303.284913] [0000000000000000] pgd=0000000000000000, p4d=0000000000000000\n[ 303.286076] Internal error: Oops: 0000000086000004 [#1] PREEMPT SMP\n[ 303.286936] Modules linked in: qrtr tpm_tis tpm_tis_core crct10dif_ce arm_smccc_trng rng_core drm fuse ip_tables x_tables ipv6\n[ 303.288586] CPU: 1 PID: 755 Comm: efi-updatevar Not tainted 6.3.0-rc1-00108-gc7d0c4695c68 #1\n[ 303.289748] Hardware name: Unknown Unknown Product/Unknown Product, BIOS 2023.04-00627-g88336918701d 04/01/2023\n[ 303.291150] pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n[ 303.292123] pc : 0x0\n[ 303.292443] lr : efivar_set_variable_locked+0x74/0xec\n[ 303.293156] sp : ffff800008673c10\n[ 303.293619] x29: ffff800008673c10 x28: ffff0000037e8000 x27: 0000000000000000\n[ 303.294592] x26: 0000000000000800 x25: ffff000002467400 x24: 0000000000000027\n[ 303.295572] x23: ffffd49ea9832000 x22: ffff0000020c9800 x21: ffff000002467000\n[ 303.296566] x20: 0000000000000001 x19: 00000000000007fc x18: 0000000000000000\n[ 303.297531] x17: 0000000000000000 x16: 0000000000000000 x15: 0000aaaac807ab54\n[ 303.298495] x14: ed37489f673633c0 x13: 71c45c606de13f80 x12: 47464259e219acf4\n[ 303.299453] x11: ffff000002af7b01 x10: 0000000000000003 x9 : 0000000000000002\n[ 303.300431] x8 : 0000000000000010 x7 : ffffd49ea8973230 x6 : 0000000000a85201\n[ 303.301412] x5 : 0000000000000000 x4 : ffff0000020c9800 x3 : 00000000000007fc\n[ 303.302370] x2 : 0000000000000027 x1 : ffff000002467400 x0 : ffff000002467000\n[ 303.303341] Call trace:\n[ 303.303679] 0x0\n[ 303.303938] efivar_entry_set_get_size+0x98/0x16c\n[ 303.304585] efivarfs_file_write+0xd0/0x1a4\n[ 303.305148] vfs_write+0xc4/0x2e4\n[ 303.305601] ksys_write+0x70/0x104\n[ 303.306073] __arm64_sys_write+0x1c/0x28\n[ 303.306622] invoke_syscall+0x48/0x114\n[ 303.307156] el0_svc_common.constprop.0+0x44/0xec\n[ 303.307803] do_el0_svc+0x38/0x98\n[ 303.308268] el0_svc+0x2c/0x84\n[ 303.308702] el0t_64_sync_handler+0xf4/0x120\n[ 303.309293] el0t_64_sync+0x190/0x194\n[ 303.309794] Code: ???????? ???????? ???????? ???????? (????????)\n[ 303.310612] ---[ end trace 0000000000000000 ]---\n\nFix this by adding a .reconfigure() function to the fs operations which\nwe can use to check the requested flags and deny anything that\u0027s not RO\nif the firmware doesn\u0027t implement SetVariable at runtime.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52463",
"url": "https://www.suse.com/security/cve/CVE-2023-52463"
},
{
"category": "external",
"summary": "SUSE Bug 1220328 for CVE-2023-52463",
"url": "https://bugzilla.suse.com/1220328"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-14T16:47:20Z",
"details": "moderate"
}
],
"title": "CVE-2023-52463"
},
{
"cve": "CVE-2023-52464",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52464"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nEDAC/thunderx: Fix possible out-of-bounds string access\n\nEnabling -Wstringop-overflow globally exposes a warning for a common bug\nin the usage of strncat():\n\n drivers/edac/thunderx_edac.c: In function \u0027thunderx_ocx_com_threaded_isr\u0027:\n drivers/edac/thunderx_edac.c:1136:17: error: \u0027strncat\u0027 specified bound 1024 equals destination size [-Werror=stringop-overflow=]\n 1136 | strncat(msg, other, OCX_MESSAGE_SIZE);\n | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~\n ...\n 1145 | strncat(msg, other, OCX_MESSAGE_SIZE);\n ...\n 1150 | strncat(msg, other, OCX_MESSAGE_SIZE);\n\n ...\n\nApparently the author of this driver expected strncat() to behave the\nway that strlcat() does, which uses the size of the destination buffer\nas its third argument rather than the length of the source buffer. The\nresult is that there is no check on the size of the allocated buffer.\n\nChange it to strlcat().\n\n [ bp: Trim compiler output, fixup commit message. ]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52464",
"url": "https://www.suse.com/security/cve/CVE-2023-52464"
},
{
"category": "external",
"summary": "SUSE Bug 1220330 for CVE-2023-52464",
"url": "https://bugzilla.suse.com/1220330"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-14T16:47:20Z",
"details": "moderate"
}
],
"title": "CVE-2023-52464"
},
{
"cve": "CVE-2023-52467",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52467"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmfd: syscon: Fix null pointer dereference in of_syscon_register()\n\nkasprintf() returns a pointer to dynamically allocated memory\nwhich can be NULL upon failure.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52467",
"url": "https://www.suse.com/security/cve/CVE-2023-52467"
},
{
"category": "external",
"summary": "SUSE Bug 1220433 for CVE-2023-52467",
"url": "https://bugzilla.suse.com/1220433"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-14T16:47:20Z",
"details": "moderate"
}
],
"title": "CVE-2023-52467"
},
{
"cve": "CVE-2023-52475",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52475"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nInput: powermate - fix use-after-free in powermate_config_complete\n\nsyzbot has found a use-after-free bug [1] in the powermate driver. This\nhappens when the device is disconnected, which leads to a memory free from\nthe powermate_device struct. When an asynchronous control message\ncompletes after the kfree and its callback is invoked, the lock does not\nexist anymore and hence the bug.\n\nUse usb_kill_urb() on pm-\u003econfig to cancel any in-progress requests upon\ndevice disconnection.\n\n[1] https://syzkaller.appspot.com/bug?extid=0434ac83f907a1dbdd1e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52475",
"url": "https://www.suse.com/security/cve/CVE-2023-52475"
},
{
"category": "external",
"summary": "SUSE Bug 1220649 for CVE-2023-52475",
"url": "https://bugzilla.suse.com/1220649"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-14T16:47:20Z",
"details": "moderate"
}
],
"title": "CVE-2023-52475"
},
{
"cve": "CVE-2023-52478",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52478"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: logitech-hidpp: Fix kernel crash on receiver USB disconnect\n\nhidpp_connect_event() has *four* time-of-check vs time-of-use (TOCTOU)\nraces when it races with itself.\n\nhidpp_connect_event() primarily runs from a workqueue but it also runs\non probe() and if a \"device-connected\" packet is received by the hw\nwhen the thread running hidpp_connect_event() from probe() is waiting on\nthe hw, then a second thread running hidpp_connect_event() will be\nstarted from the workqueue.\n\nThis opens the following races (note the below code is simplified):\n\n1. Retrieving + printing the protocol (harmless race):\n\n\tif (!hidpp-\u003eprotocol_major) {\n\t\thidpp_root_get_protocol_version()\n\t\thidpp-\u003eprotocol_major = response.rap.params[0];\n\t}\n\nWe can actually see this race hit in the dmesg in the abrt output\nattached to rhbz#2227968:\n\n[ 3064.624215] logitech-hidpp-device 0003:046D:4071.0049: HID++ 4.5 device connected.\n[ 3064.658184] logitech-hidpp-device 0003:046D:4071.0049: HID++ 4.5 device connected.\n\nTesting with extra logging added has shown that after this the 2 threads\ntake turn grabbing the hw access mutex (send_mutex) so they ping-pong\nthrough all the other TOCTOU cases managing to hit all of them:\n\n2. Updating the name to the HIDPP name (harmless race):\n\n\tif (hidpp-\u003ename == hdev-\u003ename) {\n\t\t...\n\t\thidpp-\u003ename = new_name;\n\t}\n\n3. Initializing the power_supply class for the battery (problematic!):\n\nhidpp_initialize_battery()\n{\n if (hidpp-\u003ebattery.ps)\n return 0;\n\n\tprobe_battery(); /* Blocks, threads take turns executing this */\n\n\thidpp-\u003ebattery.desc.properties =\n\t\tdevm_kmemdup(dev, hidpp_battery_props, cnt, GFP_KERNEL);\n\n\thidpp-\u003ebattery.ps =\n\t\tdevm_power_supply_register(\u0026hidpp-\u003ehid_dev-\u003edev,\n\t\t\t\t\t \u0026hidpp-\u003ebattery.desc, cfg);\n}\n\n4. Creating delayed input_device (potentially problematic):\n\n\tif (hidpp-\u003edelayed_input)\n\t\treturn;\n\n\thidpp-\u003edelayed_input = hidpp_allocate_input(hdev);\n\nThe really big problem here is 3. Hitting the race leads to the following\nsequence:\n\n\thidpp-\u003ebattery.desc.properties =\n\t\tdevm_kmemdup(dev, hidpp_battery_props, cnt, GFP_KERNEL);\n\n\thidpp-\u003ebattery.ps =\n\t\tdevm_power_supply_register(\u0026hidpp-\u003ehid_dev-\u003edev,\n\t\t\t\t\t \u0026hidpp-\u003ebattery.desc, cfg);\n\n\t...\n\n\thidpp-\u003ebattery.desc.properties =\n\t\tdevm_kmemdup(dev, hidpp_battery_props, cnt, GFP_KERNEL);\n\n\thidpp-\u003ebattery.ps =\n\t\tdevm_power_supply_register(\u0026hidpp-\u003ehid_dev-\u003edev,\n\t\t\t\t\t \u0026hidpp-\u003ebattery.desc, cfg);\n\nSo now we have registered 2 power supplies for the same battery,\nwhich looks a bit weird from userspace\u0027s pov but this is not even\nthe really big problem.\n\nNotice how:\n\n1. This is all devm-maganaged\n2. The hidpp-\u003ebattery.desc struct is shared between the 2 power supplies\n3. hidpp-\u003ebattery.desc.properties points to the result from the second\n devm_kmemdup()\n\nThis causes a use after free scenario on USB disconnect of the receiver:\n1. The last registered power supply class device gets unregistered\n2. The memory from the last devm_kmemdup() call gets freed,\n hidpp-\u003ebattery.desc.properties now points to freed memory\n3. The first registered power supply class device gets unregistered,\n this involves sending a remove uevent to userspace which invokes\n power_supply_uevent() to fill the uevent data\n4. power_supply_uevent() uses hidpp-\u003ebattery.desc.properties which\n now points to freed memory leading to backtraces like this one:\n\nSep 22 20:01:35 eric kernel: BUG: unable to handle page fault for address: ffffb2140e017f08\n...\nSep 22 20:01:35 eric kernel: Workqueue: usb_hub_wq hub_event\nSep 22 20:01:35 eric kernel: RIP: 0010:power_supply_uevent+0xee/0x1d0\n...\nSep 22 20:01:35 eric kernel: ? asm_exc_page_fault+0x26/0x30\nSep 22 20:01:35 eric kernel: ? power_supply_uevent+0xee/0x1d0\nSep 22 20:01:35 eric kernel: ? power_supply_uevent+0x10d/0x1d0\nSep 22 20:01:35 eric kernel: dev_uevent+0x10f/0x2d0\nSep 22 20:01:35 eric kernel: kobject_uevent_env+0x291/0x680\nSep 22 20:01:35 eric kernel: \n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52478",
"url": "https://www.suse.com/security/cve/CVE-2023-52478"
},
{
"category": "external",
"summary": "SUSE Bug 1220796 for CVE-2023-52478",
"url": "https://bugzilla.suse.com/1220796"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-14T16:47:20Z",
"details": "moderate"
}
],
"title": "CVE-2023-52478"
},
{
"cve": "CVE-2023-52482",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52482"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86/srso: Add SRSO mitigation for Hygon processors\n\nAdd mitigation for the speculative return stack overflow vulnerability\nwhich exists on Hygon processors too.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52482",
"url": "https://www.suse.com/security/cve/CVE-2023-52482"
},
{
"category": "external",
"summary": "SUSE Bug 1220735 for CVE-2023-52482",
"url": "https://bugzilla.suse.com/1220735"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-14T16:47:20Z",
"details": "moderate"
}
],
"title": "CVE-2023-52482"
},
{
"cve": "CVE-2023-52484",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52484"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\niommu/arm-smmu-v3: Fix soft lockup triggered by arm_smmu_mm_invalidate_range\n\nWhen running an SVA case, the following soft lockup is triggered:\n--------------------------------------------------------------------\nwatchdog: BUG: soft lockup - CPU#244 stuck for 26s!\npstate: 83400009 (Nzcv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--)\npc : arm_smmu_cmdq_issue_cmdlist+0x178/0xa50\nlr : arm_smmu_cmdq_issue_cmdlist+0x150/0xa50\nsp : ffff8000d83ef290\nx29: ffff8000d83ef290 x28: 000000003b9aca00 x27: 0000000000000000\nx26: ffff8000d83ef3c0 x25: da86c0812194a0e8 x24: 0000000000000000\nx23: 0000000000000040 x22: ffff8000d83ef340 x21: ffff0000c63980c0\nx20: 0000000000000001 x19: ffff0000c6398080 x18: 0000000000000000\nx17: 0000000000000000 x16: 0000000000000000 x15: ffff3000b4a3bbb0\nx14: ffff3000b4a30888 x13: ffff3000b4a3cf60 x12: 0000000000000000\nx11: 0000000000000000 x10: 0000000000000000 x9 : ffffc08120e4d6bc\nx8 : 0000000000000000 x7 : 0000000000000000 x6 : 0000000000048cfa\nx5 : 0000000000000000 x4 : 0000000000000001 x3 : 000000000000000a\nx2 : 0000000080000000 x1 : 0000000000000000 x0 : 0000000000000001\nCall trace:\n arm_smmu_cmdq_issue_cmdlist+0x178/0xa50\n __arm_smmu_tlb_inv_range+0x118/0x254\n arm_smmu_tlb_inv_range_asid+0x6c/0x130\n arm_smmu_mm_invalidate_range+0xa0/0xa4\n __mmu_notifier_invalidate_range_end+0x88/0x120\n unmap_vmas+0x194/0x1e0\n unmap_region+0xb4/0x144\n do_mas_align_munmap+0x290/0x490\n do_mas_munmap+0xbc/0x124\n __vm_munmap+0xa8/0x19c\n __arm64_sys_munmap+0x28/0x50\n invoke_syscall+0x78/0x11c\n el0_svc_common.constprop.0+0x58/0x1c0\n do_el0_svc+0x34/0x60\n el0_svc+0x2c/0xd4\n el0t_64_sync_handler+0x114/0x140\n el0t_64_sync+0x1a4/0x1a8\n--------------------------------------------------------------------\n\nNote that since 6.6-rc1 the arm_smmu_mm_invalidate_range above is renamed\nto \"arm_smmu_mm_arch_invalidate_secondary_tlbs\", yet the problem remains.\n\nThe commit 06ff87bae8d3 (\"arm64: mm: remove unused functions and variable\nprotoypes\") fixed a similar lockup on the CPU MMU side. Yet, it can occur\nto SMMU too, since arm_smmu_mm_arch_invalidate_secondary_tlbs() is called\ntypically next to MMU tlb flush function, e.g.\n\ttlb_flush_mmu_tlbonly {\n\t\ttlb_flush {\n\t\t\t__flush_tlb_range {\n\t\t\t\t// check MAX_TLBI_OPS\n\t\t\t}\n\t\t}\n\t\tmmu_notifier_arch_invalidate_secondary_tlbs {\n\t\t\tarm_smmu_mm_arch_invalidate_secondary_tlbs {\n\t\t\t\t// does not check MAX_TLBI_OPS\n\t\t\t}\n\t\t}\n\t}\n\nClone a CMDQ_MAX_TLBI_OPS from the MAX_TLBI_OPS in tlbflush.h, since in an\nSVA case SMMU uses the CPU page table, so it makes sense to align with the\ntlbflush code. Then, replace per-page TLBI commands with a single per-asid\nTLBI command, if the request size hits this threshold.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52484",
"url": "https://www.suse.com/security/cve/CVE-2023-52484"
},
{
"category": "external",
"summary": "SUSE Bug 1220797 for CVE-2023-52484",
"url": "https://bugzilla.suse.com/1220797"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-14T16:47:20Z",
"details": "moderate"
}
],
"title": "CVE-2023-52484"
},
{
"cve": "CVE-2023-52530",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52530"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mac80211: fix potential key use-after-free\n\nWhen ieee80211_key_link() is called by ieee80211_gtk_rekey_add()\nbut returns 0 due to KRACK protection (identical key reinstall),\nieee80211_gtk_rekey_add() will still return a pointer into the\nkey, in a potential use-after-free. This normally doesn\u0027t happen\nsince it\u0027s only called by iwlwifi in case of WoWLAN rekey offload\nwhich has its own KRACK protection, but still better to fix, do\nthat by returning an error code and converting that to success on\nthe cfg80211 boundary only, leaving the error for bad callers of\nieee80211_gtk_rekey_add().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52530",
"url": "https://www.suse.com/security/cve/CVE-2023-52530"
},
{
"category": "external",
"summary": "SUSE Bug 1220930 for CVE-2023-52530",
"url": "https://bugzilla.suse.com/1220930"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-14T16:47:20Z",
"details": "moderate"
}
],
"title": "CVE-2023-52530"
},
{
"cve": "CVE-2023-52531",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52531"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: iwlwifi: mvm: Fix a memory corruption issue\n\nA few lines above, space is kzalloc()\u0027ed for:\n\tsizeof(struct iwl_nvm_data) +\n\tsizeof(struct ieee80211_channel) +\n\tsizeof(struct ieee80211_rate)\n\n\u0027mvm-\u003envm_data\u0027 is a \u0027struct iwl_nvm_data\u0027, so it is fine.\n\nAt the end of this structure, there is the \u0027channels\u0027 flex array.\nEach element is of type \u0027struct ieee80211_channel\u0027.\nSo only 1 element is allocated in this array.\n\nWhen doing:\n mvm-\u003envm_data-\u003ebands[0].channels = mvm-\u003envm_data-\u003echannels;\nWe point at the first element of the \u0027channels\u0027 flex array.\nSo this is fine.\n\nHowever, when doing:\n mvm-\u003envm_data-\u003ebands[0].bitrates =\n\t\t\t(void *)((u8 *)mvm-\u003envm_data-\u003echannels + 1);\nbecause of the \"(u8 *)\" cast, we add only 1 to the address of the beginning\nof the flex array.\n\nIt is likely that we want point at the \u0027struct ieee80211_rate\u0027 allocated\njust after.\n\nRemove the spurious casting so that the pointer arithmetic works as\nexpected.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52531",
"url": "https://www.suse.com/security/cve/CVE-2023-52531"
},
{
"category": "external",
"summary": "SUSE Bug 1220931 for CVE-2023-52531",
"url": "https://bugzilla.suse.com/1220931"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-14T16:47:20Z",
"details": "moderate"
}
],
"title": "CVE-2023-52531"
},
{
"cve": "CVE-2023-52559",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52559"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\niommu/vt-d: Avoid memory allocation in iommu_suspend()\n\nThe iommu_suspend() syscore suspend callback is invoked with IRQ disabled.\nAllocating memory with the GFP_KERNEL flag may re-enable IRQs during\nthe suspend callback, which can cause intermittent suspend/hibernation\nproblems with the following kernel traces:\n\nCalling iommu_suspend+0x0/0x1d0\n------------[ cut here ]------------\nWARNING: CPU: 0 PID: 15 at kernel/time/timekeeping.c:868 ktime_get+0x9b/0xb0\n...\nCPU: 0 PID: 15 Comm: rcu_preempt Tainted: G U E 6.3-intel #r1\nRIP: 0010:ktime_get+0x9b/0xb0\n...\nCall Trace:\n \u003cIRQ\u003e\n tick_sched_timer+0x22/0x90\n ? __pfx_tick_sched_timer+0x10/0x10\n __hrtimer_run_queues+0x111/0x2b0\n hrtimer_interrupt+0xfa/0x230\n __sysvec_apic_timer_interrupt+0x63/0x140\n sysvec_apic_timer_interrupt+0x7b/0xa0\n \u003c/IRQ\u003e\n \u003cTASK\u003e\n asm_sysvec_apic_timer_interrupt+0x1f/0x30\n...\n------------[ cut here ]------------\nInterrupts enabled after iommu_suspend+0x0/0x1d0\nWARNING: CPU: 0 PID: 27420 at drivers/base/syscore.c:68 syscore_suspend+0x147/0x270\nCPU: 0 PID: 27420 Comm: rtcwake Tainted: G U W E 6.3-intel #r1\nRIP: 0010:syscore_suspend+0x147/0x270\n...\nCall Trace:\n \u003cTASK\u003e\n hibernation_snapshot+0x25b/0x670\n hibernate+0xcd/0x390\n state_store+0xcf/0xe0\n kobj_attr_store+0x13/0x30\n sysfs_kf_write+0x3f/0x50\n kernfs_fop_write_iter+0x128/0x200\n vfs_write+0x1fd/0x3c0\n ksys_write+0x6f/0xf0\n __x64_sys_write+0x1d/0x30\n do_syscall_64+0x3b/0x90\n entry_SYSCALL_64_after_hwframe+0x72/0xdc\n\nGiven that only 4 words memory is needed, avoid the memory allocation in\niommu_suspend().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52559",
"url": "https://www.suse.com/security/cve/CVE-2023-52559"
},
{
"category": "external",
"summary": "SUSE Bug 1220933 for CVE-2023-52559",
"url": "https://bugzilla.suse.com/1220933"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-14T16:47:20Z",
"details": "moderate"
}
],
"title": "CVE-2023-52559"
},
{
"cve": "CVE-2023-6270",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-6270"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the ATA over Ethernet (AoE) driver in the Linux kernel. The aoecmd_cfg_pkts() function improperly updates the refcnt on `struct net_device`, and a use-after-free can be triggered by racing between the free on the struct and the access through the `skbtxq` global queue. This could lead to a denial of service condition or potential code execution.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-6270",
"url": "https://www.suse.com/security/cve/CVE-2023-6270"
},
{
"category": "external",
"summary": "SUSE Bug 1218562 for CVE-2023-6270",
"url": "https://bugzilla.suse.com/1218562"
},
{
"category": "external",
"summary": "SUSE Bug 1218813 for CVE-2023-6270",
"url": "https://bugzilla.suse.com/1218813"
},
{
"category": "external",
"summary": "SUSE Bug 1221578 for CVE-2023-6270",
"url": "https://bugzilla.suse.com/1221578"
},
{
"category": "external",
"summary": "SUSE Bug 1221598 for CVE-2023-6270",
"url": "https://bugzilla.suse.com/1221598"
},
{
"category": "external",
"summary": "SUSE Bug 1223016 for CVE-2023-6270",
"url": "https://bugzilla.suse.com/1223016"
},
{
"category": "external",
"summary": "SUSE Bug 1227675 for CVE-2023-6270",
"url": "https://bugzilla.suse.com/1227675"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-14T16:47:20Z",
"details": "moderate"
}
],
"title": "CVE-2023-6270"
},
{
"cve": "CVE-2023-6817",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-6817"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free vulnerability in the Linux kernel\u0027s netfilter: nf_tables component can be exploited to achieve local privilege escalation.\n\nThe function nft_pipapo_walk did not skip inactive elements during set walk which could lead double deactivations of PIPAPO (Pile Packet Policies) elements, leading to use-after-free.\n\nWe recommend upgrading past commit 317eb9685095678f2c9f5a8189de698c5354316a.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-6817",
"url": "https://www.suse.com/security/cve/CVE-2023-6817"
},
{
"category": "external",
"summary": "SUSE Bug 1218195 for CVE-2023-6817",
"url": "https://bugzilla.suse.com/1218195"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-14T16:47:20Z",
"details": "moderate"
}
],
"title": "CVE-2023-6817"
},
{
"cve": "CVE-2024-0607",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-0607"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Netfilter subsystem in the Linux kernel. The issue is in the nft_byteorder_eval() function, where the code iterates through a loop and writes to the `dst` array. On each iteration, 8 bytes are written, but `dst` is an array of u32, so each element only has space for 4 bytes. That means every iteration overwrites part of the previous element corrupting this array of u32. This flaw allows a local user to cause a denial of service or potentially break NetFilter functionality.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-0607",
"url": "https://www.suse.com/security/cve/CVE-2024-0607"
},
{
"category": "external",
"summary": "SUSE Bug 1218915 for CVE-2024-0607",
"url": "https://bugzilla.suse.com/1218915"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-14T16:47:20Z",
"details": "moderate"
}
],
"title": "CVE-2024-0607"
},
{
"cve": "CVE-2024-1151",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-1151"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was reported in the Open vSwitch sub-component in the Linux Kernel. The flaw occurs when a recursive operation of code push recursively calls into the code block. The OVS module does not validate the stack depth, pushing too many frames and causing a stack overflow. As a result, this can lead to a crash or other related issues.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-1151",
"url": "https://www.suse.com/security/cve/CVE-2024-1151"
},
{
"category": "external",
"summary": "SUSE Bug 1219835 for CVE-2024-1151",
"url": "https://bugzilla.suse.com/1219835"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-14T16:47:20Z",
"details": "moderate"
}
],
"title": "CVE-2024-1151"
},
{
"cve": "CVE-2024-23849",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-23849"
}
],
"notes": [
{
"category": "general",
"text": "In rds_recv_track_latency in net/rds/af_rds.c in the Linux kernel through 6.7.1, there is an off-by-one error for an RDS_MSG_RX_DGRAM_TRACE_MAX comparison, resulting in out-of-bounds access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-23849",
"url": "https://www.suse.com/security/cve/CVE-2024-23849"
},
{
"category": "external",
"summary": "SUSE Bug 1219127 for CVE-2024-23849",
"url": "https://bugzilla.suse.com/1219127"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-14T16:47:20Z",
"details": "moderate"
}
],
"title": "CVE-2024-23849"
},
{
"cve": "CVE-2024-23850",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-23850"
}
],
"notes": [
{
"category": "general",
"text": "In btrfs_get_root_ref in fs/btrfs/disk-io.c in the Linux kernel through 6.7.1, there can be an assertion failure and crash because a subvolume can be read out too soon after its root item is inserted upon subvolume creation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-23850",
"url": "https://www.suse.com/security/cve/CVE-2024-23850"
},
{
"category": "external",
"summary": "SUSE Bug 1219126 for CVE-2024-23850",
"url": "https://bugzilla.suse.com/1219126"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-14T16:47:20Z",
"details": "moderate"
}
],
"title": "CVE-2024-23850"
},
{
"cve": "CVE-2024-23851",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-23851"
}
],
"notes": [
{
"category": "general",
"text": "copy_params in drivers/md/dm-ioctl.c in the Linux kernel through 6.7.1 can attempt to allocate more than INT_MAX bytes, and crash, because of a missing param_kernel-\u003edata_size check. This is related to ctl_ioctl.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-23851",
"url": "https://www.suse.com/security/cve/CVE-2024-23851"
},
{
"category": "external",
"summary": "SUSE Bug 1219146 for CVE-2024-23851",
"url": "https://bugzilla.suse.com/1219146"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-14T16:47:20Z",
"details": "moderate"
}
],
"title": "CVE-2024-23851"
},
{
"cve": "CVE-2024-26585",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26585"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntls: fix race between tx work scheduling and socket close\n\nSimilarly to previous commit, the submitting thread (recvmsg/sendmsg)\nmay exit as soon as the async crypto handler calls complete().\nReorder scheduling the work before calling complete().\nThis seems more logical in the first place, as it\u0027s\nthe inverse order of what the submitting thread will do.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26585",
"url": "https://www.suse.com/security/cve/CVE-2024-26585"
},
{
"category": "external",
"summary": "SUSE Bug 1220187 for CVE-2024-26585",
"url": "https://bugzilla.suse.com/1220187"
},
{
"category": "external",
"summary": "SUSE Bug 1220211 for CVE-2024-26585",
"url": "https://bugzilla.suse.com/1220211"
},
{
"category": "external",
"summary": "SUSE Bug 1224298 for CVE-2024-26585",
"url": "https://bugzilla.suse.com/1224298"
},
{
"category": "external",
"summary": "SUSE Bug 1224878 for CVE-2024-26585",
"url": "https://bugzilla.suse.com/1224878"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-14T16:47:20Z",
"details": "important"
}
],
"title": "CVE-2024-26585"
},
{
"cve": "CVE-2024-26586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26586"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmlxsw: spectrum_acl_tcam: Fix stack corruption\n\nWhen tc filters are first added to a net device, the corresponding local\nport gets bound to an ACL group in the device. The group contains a list\nof ACLs. In turn, each ACL points to a different TCAM region where the\nfilters are stored. During forwarding, the ACLs are sequentially\nevaluated until a match is found.\n\nOne reason to place filters in different regions is when they are added\nwith decreasing priorities and in an alternating order so that two\nconsecutive filters can never fit in the same region because of their\nkey usage.\n\nIn Spectrum-2 and newer ASICs the firmware started to report that the\nmaximum number of ACLs in a group is more than 16, but the layout of the\nregister that configures ACL groups (PAGT) was not updated to account\nfor that. It is therefore possible to hit stack corruption [1] in the\nrare case where more than 16 ACLs in a group are required.\n\nFix by limiting the maximum ACL group size to the minimum between what\nthe firmware reports and the maximum ACLs that fit in the PAGT register.\n\nAdd a test case to make sure the machine does not crash when this\ncondition is hit.\n\n[1]\nKernel panic - not syncing: stack-protector: Kernel stack is corrupted in: mlxsw_sp_acl_tcam_group_update+0x116/0x120\n[...]\n dump_stack_lvl+0x36/0x50\n panic+0x305/0x330\n __stack_chk_fail+0x15/0x20\n mlxsw_sp_acl_tcam_group_update+0x116/0x120\n mlxsw_sp_acl_tcam_group_region_attach+0x69/0x110\n mlxsw_sp_acl_tcam_vchunk_get+0x492/0xa20\n mlxsw_sp_acl_tcam_ventry_add+0x25/0xe0\n mlxsw_sp_acl_rule_add+0x47/0x240\n mlxsw_sp_flower_replace+0x1a9/0x1d0\n tc_setup_cb_add+0xdc/0x1c0\n fl_hw_replace_filter+0x146/0x1f0\n fl_change+0xc17/0x1360\n tc_new_tfilter+0x472/0xb90\n rtnetlink_rcv_msg+0x313/0x3b0\n netlink_rcv_skb+0x58/0x100\n netlink_unicast+0x244/0x390\n netlink_sendmsg+0x1e4/0x440\n ____sys_sendmsg+0x164/0x260\n ___sys_sendmsg+0x9a/0xe0\n __sys_sendmsg+0x7a/0xc0\n do_syscall_64+0x40/0xe0\n entry_SYSCALL_64_after_hwframe+0x63/0x6b",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26586",
"url": "https://www.suse.com/security/cve/CVE-2024-26586"
},
{
"category": "external",
"summary": "SUSE Bug 1220243 for CVE-2024-26586",
"url": "https://bugzilla.suse.com/1220243"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-14T16:47:20Z",
"details": "moderate"
}
],
"title": "CVE-2024-26586"
},
{
"cve": "CVE-2024-26589",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26589"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Reject variable offset alu on PTR_TO_FLOW_KEYS\n\nFor PTR_TO_FLOW_KEYS, check_flow_keys_access() only uses fixed off\nfor validation. However, variable offset ptr alu is not prohibited\nfor this ptr kind. So the variable offset is not checked.\n\nThe following prog is accepted:\n\n func#0 @0\n 0: R1=ctx() R10=fp0\n 0: (bf) r6 = r1 ; R1=ctx() R6_w=ctx()\n 1: (79) r7 = *(u64 *)(r6 +144) ; R6_w=ctx() R7_w=flow_keys()\n 2: (b7) r8 = 1024 ; R8_w=1024\n 3: (37) r8 /= 1 ; R8_w=scalar()\n 4: (57) r8 \u0026= 1024 ; R8_w=scalar(smin=smin32=0,\n smax=umax=smax32=umax32=1024,var_off=(0x0; 0x400))\n 5: (0f) r7 += r8\n mark_precise: frame0: last_idx 5 first_idx 0 subseq_idx -1\n mark_precise: frame0: regs=r8 stack= before 4: (57) r8 \u0026= 1024\n mark_precise: frame0: regs=r8 stack= before 3: (37) r8 /= 1\n mark_precise: frame0: regs=r8 stack= before 2: (b7) r8 = 1024\n 6: R7_w=flow_keys(smin=smin32=0,smax=umax=smax32=umax32=1024,var_off\n =(0x0; 0x400)) R8_w=scalar(smin=smin32=0,smax=umax=smax32=umax32=1024,\n var_off=(0x0; 0x400))\n 6: (79) r0 = *(u64 *)(r7 +0) ; R0_w=scalar()\n 7: (95) exit\n\nThis prog loads flow_keys to r7, and adds the variable offset r8\nto r7, and finally causes out-of-bounds access:\n\n BUG: unable to handle page fault for address: ffffc90014c80038\n [...]\n Call Trace:\n \u003cTASK\u003e\n bpf_dispatcher_nop_func include/linux/bpf.h:1231 [inline]\n __bpf_prog_run include/linux/filter.h:651 [inline]\n bpf_prog_run include/linux/filter.h:658 [inline]\n bpf_prog_run_pin_on_cpu include/linux/filter.h:675 [inline]\n bpf_flow_dissect+0x15f/0x350 net/core/flow_dissector.c:991\n bpf_prog_test_run_flow_dissector+0x39d/0x620 net/bpf/test_run.c:1359\n bpf_prog_test_run kernel/bpf/syscall.c:4107 [inline]\n __sys_bpf+0xf8f/0x4560 kernel/bpf/syscall.c:5475\n __do_sys_bpf kernel/bpf/syscall.c:5561 [inline]\n __se_sys_bpf kernel/bpf/syscall.c:5559 [inline]\n __x64_sys_bpf+0x73/0xb0 kernel/bpf/syscall.c:5559\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0x3f/0x110 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x63/0x6b\n\nFix this by rejecting ptr alu with variable offset on flow_keys.\nApplying the patch rejects the program with \"R7 pointer arithmetic\non flow_keys prohibited\".",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26589",
"url": "https://www.suse.com/security/cve/CVE-2024-26589"
},
{
"category": "external",
"summary": "SUSE Bug 1220255 for CVE-2024-26589",
"url": "https://bugzilla.suse.com/1220255"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-14T16:47:20Z",
"details": "moderate"
}
],
"title": "CVE-2024-26589"
},
{
"cve": "CVE-2024-26591",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26591"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Fix re-attachment branch in bpf_tracing_prog_attach\n\nThe following case can cause a crash due to missing attach_btf:\n\n1) load rawtp program\n2) load fentry program with rawtp as target_fd\n3) create tracing link for fentry program with target_fd = 0\n4) repeat 3\n\nIn the end we have:\n\n- prog-\u003eaux-\u003edst_trampoline == NULL\n- tgt_prog == NULL (because we did not provide target_fd to link_create)\n- prog-\u003eaux-\u003eattach_btf == NULL (the program was loaded with attach_prog_fd=X)\n- the program was loaded for tgt_prog but we have no way to find out which one\n\n BUG: kernel NULL pointer dereference, address: 0000000000000058\n Call Trace:\n \u003cTASK\u003e\n ? __die+0x20/0x70\n ? page_fault_oops+0x15b/0x430\n ? fixup_exception+0x22/0x330\n ? exc_page_fault+0x6f/0x170\n ? asm_exc_page_fault+0x22/0x30\n ? bpf_tracing_prog_attach+0x279/0x560\n ? btf_obj_id+0x5/0x10\n bpf_tracing_prog_attach+0x439/0x560\n __sys_bpf+0x1cf4/0x2de0\n __x64_sys_bpf+0x1c/0x30\n do_syscall_64+0x41/0xf0\n entry_SYSCALL_64_after_hwframe+0x6e/0x76\n\nReturn -EINVAL in this situation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26591",
"url": "https://www.suse.com/security/cve/CVE-2024-26591"
},
{
"category": "external",
"summary": "SUSE Bug 1220254 for CVE-2024-26591",
"url": "https://bugzilla.suse.com/1220254"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-14T16:47:20Z",
"details": "moderate"
}
],
"title": "CVE-2024-26591"
},
{
"cve": "CVE-2024-26593",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26593"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ni2c: i801: Fix block process call transactions\n\nAccording to the Intel datasheets, software must reset the block\nbuffer index twice for block process call transactions: once before\nwriting the outgoing data to the buffer, and once again before\nreading the incoming data from the buffer.\n\nThe driver is currently missing the second reset, causing the wrong\nportion of the block buffer to be read.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26593",
"url": "https://www.suse.com/security/cve/CVE-2024-26593"
},
{
"category": "external",
"summary": "SUSE Bug 1220009 for CVE-2024-26593",
"url": "https://bugzilla.suse.com/1220009"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-14T16:47:20Z",
"details": "moderate"
}
],
"title": "CVE-2024-26593"
},
{
"cve": "CVE-2024-26595",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26595"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmlxsw: spectrum_acl_tcam: Fix NULL pointer dereference in error path\n\nWhen calling mlxsw_sp_acl_tcam_region_destroy() from an error path after\nfailing to attach the region to an ACL group, we hit a NULL pointer\ndereference upon \u0027region-\u003egroup-\u003etcam\u0027 [1].\n\nFix by retrieving the \u0027tcam\u0027 pointer using mlxsw_sp_acl_to_tcam().\n\n[1]\nBUG: kernel NULL pointer dereference, address: 0000000000000000\n[...]\nRIP: 0010:mlxsw_sp_acl_tcam_region_destroy+0xa0/0xd0\n[...]\nCall Trace:\n mlxsw_sp_acl_tcam_vchunk_get+0x88b/0xa20\n mlxsw_sp_acl_tcam_ventry_add+0x25/0xe0\n mlxsw_sp_acl_rule_add+0x47/0x240\n mlxsw_sp_flower_replace+0x1a9/0x1d0\n tc_setup_cb_add+0xdc/0x1c0\n fl_hw_replace_filter+0x146/0x1f0\n fl_change+0xc17/0x1360\n tc_new_tfilter+0x472/0xb90\n rtnetlink_rcv_msg+0x313/0x3b0\n netlink_rcv_skb+0x58/0x100\n netlink_unicast+0x244/0x390\n netlink_sendmsg+0x1e4/0x440\n ____sys_sendmsg+0x164/0x260\n ___sys_sendmsg+0x9a/0xe0\n __sys_sendmsg+0x7a/0xc0\n do_syscall_64+0x40/0xe0\n entry_SYSCALL_64_after_hwframe+0x63/0x6b",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26595",
"url": "https://www.suse.com/security/cve/CVE-2024-26595"
},
{
"category": "external",
"summary": "SUSE Bug 1220344 for CVE-2024-26595",
"url": "https://bugzilla.suse.com/1220344"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-14T16:47:20Z",
"details": "moderate"
}
],
"title": "CVE-2024-26595"
},
{
"cve": "CVE-2024-26598",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26598"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache\n\nThere is a potential UAF scenario in the case of an LPI translation\ncache hit racing with an operation that invalidates the cache, such\nas a DISCARD ITS command. The root of the problem is that\nvgic_its_check_cache() does not elevate the refcount on the vgic_irq\nbefore dropping the lock that serializes refcount changes.\n\nHave vgic_its_check_cache() raise the refcount on the returned vgic_irq\nand add the corresponding decrement after queueing the interrupt.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26598",
"url": "https://www.suse.com/security/cve/CVE-2024-26598"
},
{
"category": "external",
"summary": "SUSE Bug 1220326 for CVE-2024-26598",
"url": "https://bugzilla.suse.com/1220326"
},
{
"category": "external",
"summary": "SUSE Bug 1221129 for CVE-2024-26598",
"url": "https://bugzilla.suse.com/1221129"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-14T16:47:20Z",
"details": "important"
}
],
"title": "CVE-2024-26598"
},
{
"cve": "CVE-2024-26602",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26602"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsched/membarrier: reduce the ability to hammer on sys_membarrier\n\nOn some systems, sys_membarrier can be very expensive, causing overall\nslowdowns for everything. So put a lock on the path in order to\nserialize the accesses to prevent the ability for this to be called at\ntoo high of a frequency and saturate the machine.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26602",
"url": "https://www.suse.com/security/cve/CVE-2024-26602"
},
{
"category": "external",
"summary": "SUSE Bug 1220398 for CVE-2024-26602",
"url": "https://bugzilla.suse.com/1220398"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-14T16:47:20Z",
"details": "moderate"
}
],
"title": "CVE-2024-26602"
},
{
"cve": "CVE-2024-26603",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26603"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86/fpu: Stop relying on userspace for info to fault in xsave buffer\n\nBefore this change, the expected size of the user space buffer was\ntaken from fx_sw-\u003exstate_size. fx_sw-\u003exstate_size can be changed\nfrom user-space, so it is possible construct a sigreturn frame where:\n\n * fx_sw-\u003exstate_size is smaller than the size required by valid bits in\n fx_sw-\u003exfeatures.\n * user-space unmaps parts of the sigrame fpu buffer so that not all of\n the buffer required by xrstor is accessible.\n\nIn this case, xrstor tries to restore and accesses the unmapped area\nwhich results in a fault. But fault_in_readable succeeds because buf +\nfx_sw-\u003exstate_size is within the still mapped area, so it goes back and\ntries xrstor again. It will spin in this loop forever.\n\nInstead, fault in the maximum size which can be touched by XRSTOR (taken\nfrom fpstate-\u003euser_size).\n\n[ dhansen: tweak subject / changelog ]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26603",
"url": "https://www.suse.com/security/cve/CVE-2024-26603"
},
{
"category": "external",
"summary": "SUSE Bug 1220335 for CVE-2024-26603",
"url": "https://bugzilla.suse.com/1220335"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-14T16:47:20Z",
"details": "moderate"
}
],
"title": "CVE-2024-26603"
},
{
"cve": "CVE-2024-26607",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26607"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/bridge: sii902x: Fix probing race issue\n\nA null pointer dereference crash has been observed rarely on TI\nplatforms using sii9022 bridge:\n\n[ 53.271356] sii902x_get_edid+0x34/0x70 [sii902x]\n[ 53.276066] sii902x_bridge_get_edid+0x14/0x20 [sii902x]\n[ 53.281381] drm_bridge_get_edid+0x20/0x34 [drm]\n[ 53.286305] drm_bridge_connector_get_modes+0x8c/0xcc [drm_kms_helper]\n[ 53.292955] drm_helper_probe_single_connector_modes+0x190/0x538 [drm_kms_helper]\n[ 53.300510] drm_client_modeset_probe+0x1f0/0xbd4 [drm]\n[ 53.305958] __drm_fb_helper_initial_config_and_unlock+0x50/0x510 [drm_kms_helper]\n[ 53.313611] drm_fb_helper_initial_config+0x48/0x58 [drm_kms_helper]\n[ 53.320039] drm_fbdev_dma_client_hotplug+0x84/0xd4 [drm_dma_helper]\n[ 53.326401] drm_client_register+0x5c/0xa0 [drm]\n[ 53.331216] drm_fbdev_dma_setup+0xc8/0x13c [drm_dma_helper]\n[ 53.336881] tidss_probe+0x128/0x264 [tidss]\n[ 53.341174] platform_probe+0x68/0xc4\n[ 53.344841] really_probe+0x188/0x3c4\n[ 53.348501] __driver_probe_device+0x7c/0x16c\n[ 53.352854] driver_probe_device+0x3c/0x10c\n[ 53.357033] __device_attach_driver+0xbc/0x158\n[ 53.361472] bus_for_each_drv+0x88/0xe8\n[ 53.365303] __device_attach+0xa0/0x1b4\n[ 53.369135] device_initial_probe+0x14/0x20\n[ 53.373314] bus_probe_device+0xb0/0xb4\n[ 53.377145] deferred_probe_work_func+0xcc/0x124\n[ 53.381757] process_one_work+0x1f0/0x518\n[ 53.385770] worker_thread+0x1e8/0x3dc\n[ 53.389519] kthread+0x11c/0x120\n[ 53.392750] ret_from_fork+0x10/0x20\n\nThe issue here is as follows:\n\n- tidss probes, but is deferred as sii902x is still missing.\n- sii902x starts probing and enters sii902x_init().\n- sii902x calls drm_bridge_add(). Now the sii902x bridge is ready from\n DRM\u0027s perspective.\n- sii902x calls sii902x_audio_codec_init() and\n platform_device_register_data()\n- The registration of the audio platform device causes probing of the\n deferred devices.\n- tidss probes, which eventually causes sii902x_bridge_get_edid() to be\n called.\n- sii902x_bridge_get_edid() tries to use the i2c to read the edid.\n However, the sii902x driver has not set up the i2c part yet, leading\n to the crash.\n\nFix this by moving the drm_bridge_add() to the end of the\nsii902x_init(), which is also at the very end of sii902x_probe().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26607",
"url": "https://www.suse.com/security/cve/CVE-2024-26607"
},
{
"category": "external",
"summary": "SUSE Bug 1220736 for CVE-2024-26607",
"url": "https://bugzilla.suse.com/1220736"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-14T16:47:20Z",
"details": "moderate"
}
],
"title": "CVE-2024-26607"
},
{
"cve": "CVE-2024-26622",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26622"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntomoyo: fix UAF write bug in tomoyo_write_control()\n\nSince tomoyo_write_control() updates head-\u003ewrite_buf when write()\nof long lines is requested, we need to fetch head-\u003ewrite_buf after\nhead-\u003eio_sem is held. Otherwise, concurrent write() requests can\ncause use-after-free-write and double-free problems.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26622",
"url": "https://www.suse.com/security/cve/CVE-2024-26622"
},
{
"category": "external",
"summary": "SUSE Bug 1220825 for CVE-2024-26622",
"url": "https://bugzilla.suse.com/1220825"
},
{
"category": "external",
"summary": "SUSE Bug 1220828 for CVE-2024-26622",
"url": "https://bugzilla.suse.com/1220828"
},
{
"category": "external",
"summary": "SUSE Bug 1224298 for CVE-2024-26622",
"url": "https://bugzilla.suse.com/1224298"
},
{
"category": "external",
"summary": "SUSE Bug 1224878 for CVE-2024-26622",
"url": "https://bugzilla.suse.com/1224878"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.111.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.ppc64le",
"SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.ppc64le",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.s390x",
"SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.111.2.x86_64",
"SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.111.1.noarch",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.ppc64le",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.s390x",
"SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.111.1.x86_64",
"SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.s390x",
"openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.111.2.x86_64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.aarch64",
"openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-14T16:47:20Z",
"details": "important"
}
],
"title": "CVE-2024-26622"
}
]
}
SUSE-SU-2024:0977-1
Vulnerability from csaf_suse - Published: 2024-03-22 14:33 - Updated: 2024-03-22 14:33Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\n\nThe SUSE Linux Enterprise 15 SP4 RT kernel was updated to receive various security bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2019-25162: Fixed a potential use after free (bsc#1220409).\n- CVE-2021-46923: Fixed reference leakage in fs/mount_setattr (bsc#1220457).\n- CVE-2021-46924: Fixed fix memory leak in device probe and remove (bsc#1220459)\n- CVE-2021-46932: Fixed missing work initialization before device registration (bsc#1220444)\n- CVE-2021-46934: Fixed a bug by validating user data in compat ioctl (bsc#1220469).\n- CVE-2021-47083: Fixed a global-out-of-bounds issue in mediatek: (bsc#1220917).\n- CVE-2022-48627: Fixed a memory overlapping when deleting chars in the buffer (bsc#1220845).\n- CVE-2023-28746: Fixed Register File Data Sampling (bsc#1213456).\n- CVE-2023-5197: Fixed se-after-free due to addition and removal of rules from chain bindings within the same transaction (bsc#1218216).\n- CVE-2023-52340: Fixed ICMPv6 \u201cPacket Too Big\u201d packets force a DoS of the Linux kernel by forcing 100% CPU (bsc#1219295).\n- CVE-2023-52429: Fixed potential DoS in dm_table_create in drivers/md/dm-table.c (bsc#1219827).\n- CVE-2023-52439: Fixed use-after-free in uio_open (bsc#1220140).\n- CVE-2023-52443: Fixed crash when parsed profile name is empty (bsc#1220240).\n- CVE-2023-52445: Fixed use after free on context disconnection (bsc#1220241).\n- CVE-2023-52447: Fixed map_fd_put_ptr() signature kABI workaround (bsc#1220251).\n- CVE-2023-52448: Fixed kernel NULL pointer dereference in gfs2_rgrp_dump (bsc#1220253).\n- CVE-2023-52449: Fixed gluebi NULL pointer dereference caused by ftl notifier (bsc#1220238).\n- CVE-2023-52451: Fixed access beyond end of drmem array (bsc#1220250).\n- CVE-2023-52452: Fixed Fix accesses to uninit stack slots (bsc#1220257).\n- CVE-2023-52456: Fixed tx statemachine deadlock (bsc#1220364).\n- CVE-2023-52457: Fixed skipped resource freeing if pm_runtime_resume_and_get() failed (bsc#1220350).\n- CVE-2023-52463: Fixed null pointer dereference in efivarfs (bsc#1220328).\n- CVE-2023-52464: Fixed possible out-of-bounds string access (bsc#1220330)\n- CVE-2023-52467: Fixed a null pointer dereference in of_syscon_register (bsc#1220433).\n- CVE-2023-52475: Fixed use-after-free in powermate_config_complete (bsc#1220649)\n- CVE-2023-52478: Fixed kernel crash on receiver USB disconnect (bsc#1220796)\n- CVE-2023-52482: Fixed a bug by adding SRSO mitigation for Hygon processors (bsc#1220735).\n- CVE-2023-52484: Fixed a soft lockup triggered by arm_smmu_mm_invalidate_range (bsc#1220797).\n- CVE-2023-52530: Fixed a potential key use-after-free in wifi mac80211 (bsc#1220930).\n- CVE-2023-52531: Fixed a memory corruption issue in iwlwifi (bsc#1220931).\n- CVE-2023-52559: Fixed a bug by avoiding memory allocation in iommu_suspend (bsc#1220933).\n- CVE-2023-6270: Fixed a use-after-free issue in aoecmd_cfg_pkts (bsc#1218562).\n- CVE-2023-6817: Fixed use-after-free in nft_pipapo_walk (bsc#1218195).\n- CVE-2024-0607: Fixed 64-bit load issue in nft_byteorder_eval() (bsc#1218915).\n- CVE-2024-1151: Fixed unlimited number of recursions from action sets (bsc#1219835).\n- CVE-2024-23849: Fixed array-index-out-of-bounds in rds_cmsg_recv (bsc#1219127).\n- CVE-2024-23850: Fixed double free of anonymous device after snapshot creation failure (bsc#1219126).\n- CVE-2024-23851: Fixed crash in copy_params in drivers/md/dm-ioctl.c (bsc#1219146).\n- CVE-2024-26585: Fixed race between tx work scheduling and socket close (bsc#1220187).\n- CVE-2024-26586: Fixed stack corruption (bsc#1220243).\n- CVE-2024-26589: Fixed out of bounds read due to variable offset alu on PTR_TO_FLOW_KEYS (bsc#1220255).\n- CVE-2024-26591: Fixed re-attachment branch in bpf_tracing_prog_attach (bsc#1220254).\n- CVE-2024-26593: Fixed block process call transactions (bsc#1220009).\n- CVE-2024-26595: Fixed NULL pointer dereference in error path (bsc#1220344).\n- CVE-2024-26598: Fixed potential UAF in LPI translation cache (bsc#1220326).\n- CVE-2024-26602: Fixed overall slowdowns with sys_membarrier (bsc1220398).\n- CVE-2024-26603: Fixed infinite loop via #PF handling (bsc#1220335).\n- CVE-2024-26607: Fixed a probing race issue in sii902x: (bsc#1220736).\n- CVE-2024-26622: Fixed UAF write bug in tomoyo_write_control() (bsc#1220825).\n\nThe following non-security bugs were fixed:\n\n- bpf: fix verification of indirect var-off stack access (git-fixes).\n- bpf: guard stack limits against 32bit overflow (git-fixes).\n- drop 2 git-fixes patches which are suspicious to introduce regression reported in bsc#1219073\n- fix unresolved hunks in readme.branch\n- kvm: vmx: move verw closer to vmentry for mds mitigation (git-fixes).\n- kvm: vmx: use bt+jnc, i.e. eflags.cf to select vmresume vs. vmlaunch (git-fixes).\n- nfs: avoid infinite loop in pnfs_update_layout (bsc#1219633).\n- nvme: move nvme_stop_keep_alive() back to original position (bsc#1211515).\n- nvme: remove nvme_alloc_request and nvme_alloc_request_qid (bsc#1214064).\n- nvme: start keep-alive after admin queue setup (bsc#1211515).\n- readme.branch: use correct mail for roy\n- rpm/kernel-binary.spec.in: install scripts/gdb when enabled in config (bsc#1219653) they are put into -devel subpackage. and a proper link to /usr/share/gdb/auto-load/ is created.\n- x86/asm: add _asm_rip() macro for x86-64 (%rip) suffix (git-fixes).\n- x86/bugs: add asm helpers for executing verw (git-fixes).\n- x86/bugs: use alternative() instead of mds_user_clear static key (git-fixes). also add the removed mds_user_clear symbol to kabi severities as it is exposed just for kvm module and is generally a core kernel component so removing it is low risk.\n- x86/entry_32: add verw just before userspace transition (git-fixes).\n- x86/entry_64: Add VERW just before userspace transition (git-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2024-977,SUSE-SLE-Micro-5.3-2024-977,SUSE-SLE-Micro-5.4-2024-977,SUSE-SLE-Module-Live-Patching-15-SP4-2024-977,openSUSE-Leap-Micro-5.3-2024-977,openSUSE-Leap-Micro-5.4-2024-977",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_0977-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2024:0977-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20240977-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2024:0977-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html"
},
{
"category": "self",
"summary": "SUSE Bug 1211515",
"url": "https://bugzilla.suse.com/1211515"
},
{
"category": "self",
"summary": "SUSE Bug 1213456",
"url": "https://bugzilla.suse.com/1213456"
},
{
"category": "self",
"summary": "SUSE Bug 1214064",
"url": "https://bugzilla.suse.com/1214064"
},
{
"category": "self",
"summary": "SUSE Bug 1218195",
"url": "https://bugzilla.suse.com/1218195"
},
{
"category": "self",
"summary": "SUSE Bug 1218216",
"url": "https://bugzilla.suse.com/1218216"
},
{
"category": "self",
"summary": "SUSE Bug 1218562",
"url": "https://bugzilla.suse.com/1218562"
},
{
"category": "self",
"summary": "SUSE Bug 1218915",
"url": "https://bugzilla.suse.com/1218915"
},
{
"category": "self",
"summary": "SUSE Bug 1219073",
"url": "https://bugzilla.suse.com/1219073"
},
{
"category": "self",
"summary": "SUSE Bug 1219126",
"url": "https://bugzilla.suse.com/1219126"
},
{
"category": "self",
"summary": "SUSE Bug 1219127",
"url": "https://bugzilla.suse.com/1219127"
},
{
"category": "self",
"summary": "SUSE Bug 1219146",
"url": "https://bugzilla.suse.com/1219146"
},
{
"category": "self",
"summary": "SUSE Bug 1219295",
"url": "https://bugzilla.suse.com/1219295"
},
{
"category": "self",
"summary": "SUSE Bug 1219633",
"url": "https://bugzilla.suse.com/1219633"
},
{
"category": "self",
"summary": "SUSE Bug 1219653",
"url": "https://bugzilla.suse.com/1219653"
},
{
"category": "self",
"summary": "SUSE Bug 1219827",
"url": "https://bugzilla.suse.com/1219827"
},
{
"category": "self",
"summary": "SUSE Bug 1219835",
"url": "https://bugzilla.suse.com/1219835"
},
{
"category": "self",
"summary": "SUSE Bug 1220009",
"url": "https://bugzilla.suse.com/1220009"
},
{
"category": "self",
"summary": "SUSE Bug 1220140",
"url": "https://bugzilla.suse.com/1220140"
},
{
"category": "self",
"summary": "SUSE Bug 1220187",
"url": "https://bugzilla.suse.com/1220187"
},
{
"category": "self",
"summary": "SUSE Bug 1220238",
"url": "https://bugzilla.suse.com/1220238"
},
{
"category": "self",
"summary": "SUSE Bug 1220240",
"url": "https://bugzilla.suse.com/1220240"
},
{
"category": "self",
"summary": "SUSE Bug 1220241",
"url": "https://bugzilla.suse.com/1220241"
},
{
"category": "self",
"summary": "SUSE Bug 1220243",
"url": "https://bugzilla.suse.com/1220243"
},
{
"category": "self",
"summary": "SUSE Bug 1220250",
"url": "https://bugzilla.suse.com/1220250"
},
{
"category": "self",
"summary": "SUSE Bug 1220251",
"url": "https://bugzilla.suse.com/1220251"
},
{
"category": "self",
"summary": "SUSE Bug 1220253",
"url": "https://bugzilla.suse.com/1220253"
},
{
"category": "self",
"summary": "SUSE Bug 1220254",
"url": "https://bugzilla.suse.com/1220254"
},
{
"category": "self",
"summary": "SUSE Bug 1220255",
"url": "https://bugzilla.suse.com/1220255"
},
{
"category": "self",
"summary": "SUSE Bug 1220257",
"url": "https://bugzilla.suse.com/1220257"
},
{
"category": "self",
"summary": "SUSE Bug 1220326",
"url": "https://bugzilla.suse.com/1220326"
},
{
"category": "self",
"summary": "SUSE Bug 1220328",
"url": "https://bugzilla.suse.com/1220328"
},
{
"category": "self",
"summary": "SUSE Bug 1220330",
"url": "https://bugzilla.suse.com/1220330"
},
{
"category": "self",
"summary": "SUSE Bug 1220335",
"url": "https://bugzilla.suse.com/1220335"
},
{
"category": "self",
"summary": "SUSE Bug 1220344",
"url": "https://bugzilla.suse.com/1220344"
},
{
"category": "self",
"summary": "SUSE Bug 1220350",
"url": "https://bugzilla.suse.com/1220350"
},
{
"category": "self",
"summary": "SUSE Bug 1220364",
"url": "https://bugzilla.suse.com/1220364"
},
{
"category": "self",
"summary": "SUSE Bug 1220398",
"url": "https://bugzilla.suse.com/1220398"
},
{
"category": "self",
"summary": "SUSE Bug 1220409",
"url": "https://bugzilla.suse.com/1220409"
},
{
"category": "self",
"summary": "SUSE Bug 1220433",
"url": "https://bugzilla.suse.com/1220433"
},
{
"category": "self",
"summary": "SUSE Bug 1220444",
"url": "https://bugzilla.suse.com/1220444"
},
{
"category": "self",
"summary": "SUSE Bug 1220457",
"url": "https://bugzilla.suse.com/1220457"
},
{
"category": "self",
"summary": "SUSE Bug 1220459",
"url": "https://bugzilla.suse.com/1220459"
},
{
"category": "self",
"summary": "SUSE Bug 1220469",
"url": "https://bugzilla.suse.com/1220469"
},
{
"category": "self",
"summary": "SUSE Bug 1220649",
"url": "https://bugzilla.suse.com/1220649"
},
{
"category": "self",
"summary": "SUSE Bug 1220735",
"url": "https://bugzilla.suse.com/1220735"
},
{
"category": "self",
"summary": "SUSE Bug 1220736",
"url": "https://bugzilla.suse.com/1220736"
},
{
"category": "self",
"summary": "SUSE Bug 1220796",
"url": "https://bugzilla.suse.com/1220796"
},
{
"category": "self",
"summary": "SUSE Bug 1220797",
"url": "https://bugzilla.suse.com/1220797"
},
{
"category": "self",
"summary": "SUSE Bug 1220825",
"url": "https://bugzilla.suse.com/1220825"
},
{
"category": "self",
"summary": "SUSE Bug 1220845",
"url": "https://bugzilla.suse.com/1220845"
},
{
"category": "self",
"summary": "SUSE Bug 1220917",
"url": "https://bugzilla.suse.com/1220917"
},
{
"category": "self",
"summary": "SUSE Bug 1220930",
"url": "https://bugzilla.suse.com/1220930"
},
{
"category": "self",
"summary": "SUSE Bug 1220931",
"url": "https://bugzilla.suse.com/1220931"
},
{
"category": "self",
"summary": "SUSE Bug 1220933",
"url": "https://bugzilla.suse.com/1220933"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-25162 page",
"url": "https://www.suse.com/security/cve/CVE-2019-25162/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-46923 page",
"url": "https://www.suse.com/security/cve/CVE-2021-46923/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-46924 page",
"url": "https://www.suse.com/security/cve/CVE-2021-46924/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-46932 page",
"url": "https://www.suse.com/security/cve/CVE-2021-46932/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-46934 page",
"url": "https://www.suse.com/security/cve/CVE-2021-46934/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47083 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47083/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48627 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48627/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-28746 page",
"url": "https://www.suse.com/security/cve/CVE-2023-28746/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-5197 page",
"url": "https://www.suse.com/security/cve/CVE-2023-5197/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52340 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52340/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52429 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52429/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52439 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52439/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52443 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52443/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52445 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52445/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52447 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52447/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52448 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52448/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52449 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52449/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52451 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52451/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52452 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52452/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52456 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52456/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52457 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52457/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52463 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52463/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52464 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52464/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52467 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52467/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52475 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52475/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52478 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52478/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52482 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52482/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52484 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52484/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52530 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52530/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52531 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52531/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52559 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52559/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-6270 page",
"url": "https://www.suse.com/security/cve/CVE-2023-6270/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-6817 page",
"url": "https://www.suse.com/security/cve/CVE-2023-6817/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-0607 page",
"url": "https://www.suse.com/security/cve/CVE-2024-0607/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-1151 page",
"url": "https://www.suse.com/security/cve/CVE-2024-1151/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-23849 page",
"url": "https://www.suse.com/security/cve/CVE-2024-23849/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-23850 page",
"url": "https://www.suse.com/security/cve/CVE-2024-23850/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-23851 page",
"url": "https://www.suse.com/security/cve/CVE-2024-23851/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26585 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26585/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26586 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26589 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26589/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26591 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26591/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26593 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26593/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26595 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26595/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26598 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26598/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26602 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26602/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26603 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26603/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26607 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26607/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26622 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26622/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2024-03-22T14:33:44Z",
"generator": {
"date": "2024-03-22T14:33:44Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2024:0977-1",
"initial_release_date": "2024-03-22T14:33:44Z",
"revision_history": [
{
"date": "2024-03-22T14:33:44Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-rt-5.14.21-150400.15.71.1.noarch",
"product": {
"name": "kernel-devel-rt-5.14.21-150400.15.71.1.noarch",
"product_id": "kernel-devel-rt-5.14.21-150400.15.71.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"product": {
"name": "kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"product_id": "kernel-source-rt-5.14.21-150400.15.71.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-rt-5.14.21-150400.15.71.1.x86_64",
"product": {
"name": "cluster-md-kmp-rt-5.14.21-150400.15.71.1.x86_64",
"product_id": "cluster-md-kmp-rt-5.14.21-150400.15.71.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-rt-5.14.21-150400.15.71.1.x86_64",
"product": {
"name": "dlm-kmp-rt-5.14.21-150400.15.71.1.x86_64",
"product_id": "dlm-kmp-rt-5.14.21-150400.15.71.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-rt-5.14.21-150400.15.71.1.x86_64",
"product": {
"name": "gfs2-kmp-rt-5.14.21-150400.15.71.1.x86_64",
"product_id": "gfs2-kmp-rt-5.14.21-150400.15.71.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"product": {
"name": "kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"product_id": "kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-5.14.21-150400.15.71.1.x86_64",
"product": {
"name": "kernel-rt-5.14.21-150400.15.71.1.x86_64",
"product_id": "kernel-rt-5.14.21-150400.15.71.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-5.14.21-150400.15.71.1.x86_64",
"product": {
"name": "kernel-rt-devel-5.14.21-150400.15.71.1.x86_64",
"product_id": "kernel-rt-devel-5.14.21-150400.15.71.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-extra-5.14.21-150400.15.71.1.x86_64",
"product": {
"name": "kernel-rt-extra-5.14.21-150400.15.71.1.x86_64",
"product_id": "kernel-rt-extra-5.14.21-150400.15.71.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-livepatch-5.14.21-150400.15.71.1.x86_64",
"product": {
"name": "kernel-rt-livepatch-5.14.21-150400.15.71.1.x86_64",
"product_id": "kernel-rt-livepatch-5.14.21-150400.15.71.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-livepatch-devel-5.14.21-150400.15.71.1.x86_64",
"product": {
"name": "kernel-rt-livepatch-devel-5.14.21-150400.15.71.1.x86_64",
"product_id": "kernel-rt-livepatch-devel-5.14.21-150400.15.71.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-optional-5.14.21-150400.15.71.1.x86_64",
"product": {
"name": "kernel-rt-optional-5.14.21-150400.15.71.1.x86_64",
"product_id": "kernel-rt-optional-5.14.21-150400.15.71.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-5.14.21-150400.15.71.1.x86_64",
"product": {
"name": "kernel-rt_debug-5.14.21-150400.15.71.1.x86_64",
"product_id": "kernel-rt_debug-5.14.21-150400.15.71.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-devel-5.14.21-150400.15.71.1.x86_64",
"product": {
"name": "kernel-rt_debug-devel-5.14.21-150400.15.71.1.x86_64",
"product_id": "kernel-rt_debug-devel-5.14.21-150400.15.71.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-livepatch-devel-5.14.21-150400.15.71.1.x86_64",
"product": {
"name": "kernel-rt_debug-livepatch-devel-5.14.21-150400.15.71.1.x86_64",
"product_id": "kernel-rt_debug-livepatch-devel-5.14.21-150400.15.71.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-rt-5.14.21-150400.15.71.1.x86_64",
"product": {
"name": "kernel-syms-rt-5.14.21-150400.15.71.1.x86_64",
"product_id": "kernel-syms-rt-5.14.21-150400.15.71.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-rt-5.14.21-150400.15.71.1.x86_64",
"product": {
"name": "kselftests-kmp-rt-5.14.21-150400.15.71.1.x86_64",
"product_id": "kselftests-kmp-rt-5.14.21-150400.15.71.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-rt-5.14.21-150400.15.71.1.x86_64",
"product": {
"name": "ocfs2-kmp-rt-5.14.21-150400.15.71.1.x86_64",
"product_id": "ocfs2-kmp-rt-5.14.21-150400.15.71.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-rt-5.14.21-150400.15.71.1.x86_64",
"product": {
"name": "reiserfs-kmp-rt-5.14.21-150400.15.71.1.x86_64",
"product_id": "reiserfs-kmp-rt-5.14.21-150400.15.71.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.3",
"product": {
"name": "SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-micro:5.3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.4",
"product": {
"name": "SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-micro:5.4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp4"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap Micro 5.3",
"product": {
"name": "openSUSE Leap Micro 5.3",
"product_id": "openSUSE Leap Micro 5.3",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap-micro:5.3"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap Micro 5.4",
"product": {
"name": "openSUSE Leap Micro 5.4",
"product_id": "openSUSE Leap Micro 5.4",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap-micro:5.4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-5.14.21-150400.15.71.1.x86_64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64"
},
"product_reference": "kernel-rt-5.14.21-150400.15.71.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-rt-5.14.21-150400.15.71.1.noarch as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch"
},
"product_reference": "kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-5.14.21-150400.15.71.1.x86_64 as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
},
"product_reference": "kernel-rt-5.14.21-150400.15.71.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-rt-5.14.21-150400.15.71.1.noarch as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch"
},
"product_reference": "kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64"
},
"product_reference": "kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-5.14.21-150400.15.71.1.x86_64 as component of openSUSE Leap Micro 5.3",
"product_id": "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64"
},
"product_reference": "kernel-rt-5.14.21-150400.15.71.1.x86_64",
"relates_to_product_reference": "openSUSE Leap Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-5.14.21-150400.15.71.1.x86_64 as component of openSUSE Leap Micro 5.4",
"product_id": "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
},
"product_reference": "kernel-rt-5.14.21-150400.15.71.1.x86_64",
"relates_to_product_reference": "openSUSE Leap Micro 5.4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-25162",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-25162"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ni2c: Fix a potential use after free\n\nFree the adap structure only after we are done using it.\nThis patch just moves the put_device() down a bit to avoid the\nuse after free.\n\n[wsa: added comment to the code, added Fixes tag]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-25162",
"url": "https://www.suse.com/security/cve/CVE-2019-25162"
},
{
"category": "external",
"summary": "SUSE Bug 1220409 for CVE-2019-25162",
"url": "https://bugzilla.suse.com/1220409"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-22T14:33:44Z",
"details": "moderate"
}
],
"title": "CVE-2019-25162"
},
{
"cve": "CVE-2021-46923",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-46923"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs/mount_setattr: always cleanup mount_kattr\n\nMake sure that finish_mount_kattr() is called after mount_kattr was\nsuccesfully built in both the success and failure case to prevent\nleaking any references we took when we built it. We returned early if\npath lookup failed thereby risking to leak an additional reference we\ntook when building mount_kattr when an idmapped mount was requested.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-46923",
"url": "https://www.suse.com/security/cve/CVE-2021-46923"
},
{
"category": "external",
"summary": "SUSE Bug 1220457 for CVE-2021-46923",
"url": "https://bugzilla.suse.com/1220457"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-22T14:33:44Z",
"details": "low"
}
],
"title": "CVE-2021-46923"
},
{
"cve": "CVE-2021-46924",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-46924"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFC: st21nfca: Fix memory leak in device probe and remove\n\n\u0027phy-\u003epending_skb\u0027 is alloced when device probe, but forgot to free\nin the error handling path and remove path, this cause memory leak\nas follows:\n\nunreferenced object 0xffff88800bc06800 (size 512):\n comm \"8\", pid 11775, jiffies 4295159829 (age 9.032s)\n hex dump (first 32 bytes):\n 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\n 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\n backtrace:\n [\u003c00000000d66c09ce\u003e] __kmalloc_node_track_caller+0x1ed/0x450\n [\u003c00000000c93382b3\u003e] kmalloc_reserve+0x37/0xd0\n [\u003c000000005fea522c\u003e] __alloc_skb+0x124/0x380\n [\u003c0000000019f29f9a\u003e] st21nfca_hci_i2c_probe+0x170/0x8f2\n\nFix it by freeing \u0027pending_skb\u0027 in error and remove.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-46924",
"url": "https://www.suse.com/security/cve/CVE-2021-46924"
},
{
"category": "external",
"summary": "SUSE Bug 1220459 for CVE-2021-46924",
"url": "https://bugzilla.suse.com/1220459"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-22T14:33:44Z",
"details": "moderate"
}
],
"title": "CVE-2021-46924"
},
{
"cve": "CVE-2021-46932",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-46932"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nInput: appletouch - initialize work before device registration\n\nSyzbot has reported warning in __flush_work(). This warning is caused by\nwork-\u003efunc == NULL, which means missing work initialization.\n\nThis may happen, since input_dev-\u003eclose() calls\ncancel_work_sync(\u0026dev-\u003ework), but dev-\u003ework initalization happens _after_\ninput_register_device() call.\n\nSo this patch moves dev-\u003ework initialization before registering input\ndevice",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-46932",
"url": "https://www.suse.com/security/cve/CVE-2021-46932"
},
{
"category": "external",
"summary": "SUSE Bug 1220444 for CVE-2021-46932",
"url": "https://bugzilla.suse.com/1220444"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-22T14:33:44Z",
"details": "moderate"
}
],
"title": "CVE-2021-46932"
},
{
"cve": "CVE-2021-46934",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-46934"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ni2c: validate user data in compat ioctl\n\nWrong user data may cause warning in i2c_transfer(), ex: zero msgs.\nUserspace should not be able to trigger warnings, so this patch adds\nvalidation checks for user data in compact ioctl to prevent reported\nwarnings",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-46934",
"url": "https://www.suse.com/security/cve/CVE-2021-46934"
},
{
"category": "external",
"summary": "SUSE Bug 1220469 for CVE-2021-46934",
"url": "https://bugzilla.suse.com/1220469"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-22T14:33:44Z",
"details": "low"
}
],
"title": "CVE-2021-46934"
},
{
"cve": "CVE-2021-47083",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47083"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npinctrl: mediatek: fix global-out-of-bounds issue\n\nWhen eint virtual eint number is greater than gpio number,\nit maybe produce \u0027desc[eint_n]\u0027 size globle-out-of-bounds issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47083",
"url": "https://www.suse.com/security/cve/CVE-2021-47083"
},
{
"category": "external",
"summary": "SUSE Bug 1220917 for CVE-2021-47083",
"url": "https://bugzilla.suse.com/1220917"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-22T14:33:44Z",
"details": "moderate"
}
],
"title": "CVE-2021-47083"
},
{
"cve": "CVE-2022-48627",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48627"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvt: fix memory overlapping when deleting chars in the buffer\n\nA memory overlapping copy occurs when deleting a long line. This memory\noverlapping copy can cause data corruption when scr_memcpyw is optimized\nto memcpy because memcpy does not ensure its behavior if the destination\nbuffer overlaps with the source buffer. The line buffer is not always\nbroken, because the memcpy utilizes the hardware acceleration, whose\nresult is not deterministic.\n\nFix this problem by using replacing the scr_memcpyw with scr_memmovew.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48627",
"url": "https://www.suse.com/security/cve/CVE-2022-48627"
},
{
"category": "external",
"summary": "SUSE Bug 1220845 for CVE-2022-48627",
"url": "https://bugzilla.suse.com/1220845"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-22T14:33:44Z",
"details": "moderate"
}
],
"title": "CVE-2022-48627"
},
{
"cve": "CVE-2023-28746",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-28746"
}
],
"notes": [
{
"category": "general",
"text": "Information exposure through microarchitectural state after transient execution from some register files for some Intel(R) Atom(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-28746",
"url": "https://www.suse.com/security/cve/CVE-2023-28746"
},
{
"category": "external",
"summary": "SUSE Bug 1213456 for CVE-2023-28746",
"url": "https://bugzilla.suse.com/1213456"
},
{
"category": "external",
"summary": "SUSE Bug 1221323 for CVE-2023-28746",
"url": "https://bugzilla.suse.com/1221323"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-22T14:33:44Z",
"details": "moderate"
}
],
"title": "CVE-2023-28746"
},
{
"cve": "CVE-2023-5197",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-5197"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free vulnerability in the Linux kernel\u0027s netfilter: nf_tables component can be exploited to achieve local privilege escalation.\n\nAddition and removal of rules from chain bindings within the same transaction causes leads to use-after-free.\n\nWe recommend upgrading past commit f15f29fd4779be8a418b66e9d52979bb6d6c2325.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-5197",
"url": "https://www.suse.com/security/cve/CVE-2023-5197"
},
{
"category": "external",
"summary": "SUSE Bug 1218216 for CVE-2023-5197",
"url": "https://bugzilla.suse.com/1218216"
},
{
"category": "external",
"summary": "SUSE Bug 1245974 for CVE-2023-5197",
"url": "https://bugzilla.suse.com/1245974"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-22T14:33:44Z",
"details": "important"
}
],
"title": "CVE-2023-5197"
},
{
"cve": "CVE-2023-52340",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52340"
}
],
"notes": [
{
"category": "general",
"text": "The IPv6 implementation in the Linux kernel before 6.3 has a net/ipv6/route.c max_size threshold that can be consumed easily, e.g., leading to a denial of service (network is unreachable errors) when IPv6 packets are sent in a loop via a raw socket.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52340",
"url": "https://www.suse.com/security/cve/CVE-2023-52340"
},
{
"category": "external",
"summary": "SUSE Bug 1219295 for CVE-2023-52340",
"url": "https://bugzilla.suse.com/1219295"
},
{
"category": "external",
"summary": "SUSE Bug 1219296 for CVE-2023-52340",
"url": "https://bugzilla.suse.com/1219296"
},
{
"category": "external",
"summary": "SUSE Bug 1224298 for CVE-2023-52340",
"url": "https://bugzilla.suse.com/1224298"
},
{
"category": "external",
"summary": "SUSE Bug 1224878 for CVE-2023-52340",
"url": "https://bugzilla.suse.com/1224878"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-22T14:33:44Z",
"details": "important"
}
],
"title": "CVE-2023-52340"
},
{
"cve": "CVE-2023-52429",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52429"
}
],
"notes": [
{
"category": "general",
"text": "dm_table_create in drivers/md/dm-table.c in the Linux kernel through 6.7.4 can attempt to (in alloc_targets) allocate more than INT_MAX bytes, and crash, because of a missing check for struct dm_ioctl.target_count.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52429",
"url": "https://www.suse.com/security/cve/CVE-2023-52429"
},
{
"category": "external",
"summary": "SUSE Bug 1219827 for CVE-2023-52429",
"url": "https://bugzilla.suse.com/1219827"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-22T14:33:44Z",
"details": "moderate"
}
],
"title": "CVE-2023-52429"
},
{
"cve": "CVE-2023-52439",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52439"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nuio: Fix use-after-free in uio_open\n\ncore-1\t\t\t\tcore-2\n-------------------------------------------------------\nuio_unregister_device\t\tuio_open\n\t\t\t\tidev = idr_find()\ndevice_unregister(\u0026idev-\u003edev)\nput_device(\u0026idev-\u003edev)\nuio_device_release\n\t\t\t\tget_device(\u0026idev-\u003edev)\nkfree(idev)\nuio_free_minor(minor)\n\t\t\t\tuio_release\n\t\t\t\tput_device(\u0026idev-\u003edev)\n\t\t\t\tkfree(idev)\n-------------------------------------------------------\n\nIn the core-1 uio_unregister_device(), the device_unregister will kfree\nidev when the idev-\u003edev kobject ref is 1. But after core-1\ndevice_unregister, put_device and before doing kfree, the core-2 may\nget_device. Then:\n1. After core-1 kfree idev, the core-2 will do use-after-free for idev.\n2. When core-2 do uio_release and put_device, the idev will be double\n freed.\n\nTo address this issue, we can get idev atomic \u0026 inc idev reference with\nminor_lock.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52439",
"url": "https://www.suse.com/security/cve/CVE-2023-52439"
},
{
"category": "external",
"summary": "SUSE Bug 1220140 for CVE-2023-52439",
"url": "https://bugzilla.suse.com/1220140"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-22T14:33:44Z",
"details": "moderate"
}
],
"title": "CVE-2023-52439"
},
{
"cve": "CVE-2023-52443",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52443"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\napparmor: avoid crash when parsed profile name is empty\n\nWhen processing a packed profile in unpack_profile() described like\n\n \"profile :ns::samba-dcerpcd /usr/lib*/samba/{,samba/}samba-dcerpcd {...}\"\n\na string \":samba-dcerpcd\" is unpacked as a fully-qualified name and then\npassed to aa_splitn_fqname().\n\naa_splitn_fqname() treats \":samba-dcerpcd\" as only containing a namespace.\nThus it returns NULL for tmpname, meanwhile tmpns is non-NULL. Later\naa_alloc_profile() crashes as the new profile name is NULL now.\n\ngeneral protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN NOPTI\nKASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007]\nCPU: 6 PID: 1657 Comm: apparmor_parser Not tainted 6.7.0-rc2-dirty #16\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.2-3-gd478f380-rebuilt.opensuse.org 04/01/2014\nRIP: 0010:strlen+0x1e/0xa0\nCall Trace:\n \u003cTASK\u003e\n ? strlen+0x1e/0xa0\n aa_policy_init+0x1bb/0x230\n aa_alloc_profile+0xb1/0x480\n unpack_profile+0x3bc/0x4960\n aa_unpack+0x309/0x15e0\n aa_replace_profiles+0x213/0x33c0\n policy_update+0x261/0x370\n profile_replace+0x20e/0x2a0\n vfs_write+0x2af/0xe00\n ksys_write+0x126/0x250\n do_syscall_64+0x46/0xf0\n entry_SYSCALL_64_after_hwframe+0x6e/0x76\n \u003c/TASK\u003e\n---[ end trace 0000000000000000 ]---\nRIP: 0010:strlen+0x1e/0xa0\n\nIt seems such behaviour of aa_splitn_fqname() is expected and checked in\nother places where it is called (e.g. aa_remove_profiles). Well, there\nis an explicit comment \"a ns name without a following profile is allowed\"\ninside.\n\nAFAICS, nothing can prevent unpacked \"name\" to be in form like\n\":samba-dcerpcd\" - it is passed from userspace.\n\nDeny the whole profile set replacement in such case and inform user with\nEPROTO and an explaining message.\n\nFound by Linux Verification Center (linuxtesting.org).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52443",
"url": "https://www.suse.com/security/cve/CVE-2023-52443"
},
{
"category": "external",
"summary": "SUSE Bug 1220240 for CVE-2023-52443",
"url": "https://bugzilla.suse.com/1220240"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-22T14:33:44Z",
"details": "moderate"
}
],
"title": "CVE-2023-52443"
},
{
"cve": "CVE-2023-52445",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52445"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: pvrusb2: fix use after free on context disconnection\n\nUpon module load, a kthread is created targeting the\npvr2_context_thread_func function, which may call pvr2_context_destroy\nand thus call kfree() on the context object. However, that might happen\nbefore the usb hub_event handler is able to notify the driver. This\npatch adds a sanity check before the invalid read reported by syzbot,\nwithin the context disconnection call stack.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52445",
"url": "https://www.suse.com/security/cve/CVE-2023-52445"
},
{
"category": "external",
"summary": "SUSE Bug 1220241 for CVE-2023-52445",
"url": "https://bugzilla.suse.com/1220241"
},
{
"category": "external",
"summary": "SUSE Bug 1220315 for CVE-2023-52445",
"url": "https://bugzilla.suse.com/1220315"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-22T14:33:44Z",
"details": "moderate"
}
],
"title": "CVE-2023-52445"
},
{
"cve": "CVE-2023-52447",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52447"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Defer the free of inner map when necessary\n\nWhen updating or deleting an inner map in map array or map htab, the map\nmay still be accessed by non-sleepable program or sleepable program.\nHowever bpf_map_fd_put_ptr() decreases the ref-counter of the inner map\ndirectly through bpf_map_put(), if the ref-counter is the last one\n(which is true for most cases), the inner map will be freed by\nops-\u003emap_free() in a kworker. But for now, most .map_free() callbacks\ndon\u0027t use synchronize_rcu() or its variants to wait for the elapse of a\nRCU grace period, so after the invocation of ops-\u003emap_free completes,\nthe bpf program which is accessing the inner map may incur\nuse-after-free problem.\n\nFix the free of inner map by invoking bpf_map_free_deferred() after both\none RCU grace period and one tasks trace RCU grace period if the inner\nmap has been removed from the outer map before. The deferment is\naccomplished by using call_rcu() or call_rcu_tasks_trace() when\nreleasing the last ref-counter of bpf map. The newly-added rcu_head\nfield in bpf_map shares the same storage space with work field to\nreduce the size of bpf_map.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52447",
"url": "https://www.suse.com/security/cve/CVE-2023-52447"
},
{
"category": "external",
"summary": "SUSE Bug 1220251 for CVE-2023-52447",
"url": "https://bugzilla.suse.com/1220251"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-22T14:33:44Z",
"details": "moderate"
}
],
"title": "CVE-2023-52447"
},
{
"cve": "CVE-2023-52448",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52448"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ngfs2: Fix kernel NULL pointer dereference in gfs2_rgrp_dump\n\nSyzkaller has reported a NULL pointer dereference when accessing\nrgd-\u003erd_rgl in gfs2_rgrp_dump(). This can happen when creating\nrgd-\u003erd_gl fails in read_rindex_entry(). Add a NULL pointer check in\ngfs2_rgrp_dump() to prevent that.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52448",
"url": "https://www.suse.com/security/cve/CVE-2023-52448"
},
{
"category": "external",
"summary": "SUSE Bug 1220253 for CVE-2023-52448",
"url": "https://bugzilla.suse.com/1220253"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-22T14:33:44Z",
"details": "moderate"
}
],
"title": "CVE-2023-52448"
},
{
"cve": "CVE-2023-52449",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52449"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmtd: Fix gluebi NULL pointer dereference caused by ftl notifier\n\nIf both ftl.ko and gluebi.ko are loaded, the notifier of ftl\ntriggers NULL pointer dereference when trying to access\n\u0027gluebi-\u003edesc\u0027 in gluebi_read().\n\nubi_gluebi_init\n ubi_register_volume_notifier\n ubi_enumerate_volumes\n ubi_notify_all\n gluebi_notify nb-\u003enotifier_call()\n gluebi_create\n mtd_device_register\n mtd_device_parse_register\n add_mtd_device\n blktrans_notify_add not-\u003eadd()\n ftl_add_mtd tr-\u003eadd_mtd()\n scan_header\n mtd_read\n mtd_read_oob\n mtd_read_oob_std\n gluebi_read mtd-\u003eread()\n gluebi-\u003edesc - NULL\n\nDetailed reproduction information available at the Link [1],\n\nIn the normal case, obtain gluebi-\u003edesc in the gluebi_get_device(),\nand access gluebi-\u003edesc in the gluebi_read(). However,\ngluebi_get_device() is not executed in advance in the\nftl_add_mtd() process, which leads to NULL pointer dereference.\n\nThe solution for the gluebi module is to run jffs2 on the UBI\nvolume without considering working with ftl or mtdblock [2].\nTherefore, this problem can be avoided by preventing gluebi from\ncreating the mtdblock device after creating mtd partition of the\ntype MTD_UBIVOLUME.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52449",
"url": "https://www.suse.com/security/cve/CVE-2023-52449"
},
{
"category": "external",
"summary": "SUSE Bug 1220238 for CVE-2023-52449",
"url": "https://bugzilla.suse.com/1220238"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-22T14:33:44Z",
"details": "moderate"
}
],
"title": "CVE-2023-52449"
},
{
"cve": "CVE-2023-52451",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52451"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/pseries/memhp: Fix access beyond end of drmem array\n\ndlpar_memory_remove_by_index() may access beyond the bounds of the\ndrmem lmb array when the LMB lookup fails to match an entry with the\ngiven DRC index. When the search fails, the cursor is left pointing to\n\u0026drmem_info-\u003elmbs[drmem_info-\u003en_lmbs], which is one element past the\nlast valid entry in the array. The debug message at the end of the\nfunction then dereferences this pointer:\n\n pr_debug(\"Failed to hot-remove memory at %llx\\n\",\n lmb-\u003ebase_addr);\n\nThis was found by inspection and confirmed with KASAN:\n\n pseries-hotplug-mem: Attempting to hot-remove LMB, drc index 1234\n ==================================================================\n BUG: KASAN: slab-out-of-bounds in dlpar_memory+0x298/0x1658\n Read of size 8 at addr c000000364e97fd0 by task bash/949\n\n dump_stack_lvl+0xa4/0xfc (unreliable)\n print_report+0x214/0x63c\n kasan_report+0x140/0x2e0\n __asan_load8+0xa8/0xe0\n dlpar_memory+0x298/0x1658\n handle_dlpar_errorlog+0x130/0x1d0\n dlpar_store+0x18c/0x3e0\n kobj_attr_store+0x68/0xa0\n sysfs_kf_write+0xc4/0x110\n kernfs_fop_write_iter+0x26c/0x390\n vfs_write+0x2d4/0x4e0\n ksys_write+0xac/0x1a0\n system_call_exception+0x268/0x530\n system_call_vectored_common+0x15c/0x2ec\n\n Allocated by task 1:\n kasan_save_stack+0x48/0x80\n kasan_set_track+0x34/0x50\n kasan_save_alloc_info+0x34/0x50\n __kasan_kmalloc+0xd0/0x120\n __kmalloc+0x8c/0x320\n kmalloc_array.constprop.0+0x48/0x5c\n drmem_init+0x2a0/0x41c\n do_one_initcall+0xe0/0x5c0\n kernel_init_freeable+0x4ec/0x5a0\n kernel_init+0x30/0x1e0\n ret_from_kernel_user_thread+0x14/0x1c\n\n The buggy address belongs to the object at c000000364e80000\n which belongs to the cache kmalloc-128k of size 131072\n The buggy address is located 0 bytes to the right of\n allocated 98256-byte region [c000000364e80000, c000000364e97fd0)\n\n ==================================================================\n pseries-hotplug-mem: Failed to hot-remove memory at 0\n\nLog failed lookups with a separate message and dereference the\ncursor only when it points to a valid entry.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52451",
"url": "https://www.suse.com/security/cve/CVE-2023-52451"
},
{
"category": "external",
"summary": "SUSE Bug 1220250 for CVE-2023-52451",
"url": "https://bugzilla.suse.com/1220250"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-22T14:33:44Z",
"details": "moderate"
}
],
"title": "CVE-2023-52451"
},
{
"cve": "CVE-2023-52452",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52452"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Fix accesses to uninit stack slots\n\nPrivileged programs are supposed to be able to read uninitialized stack\nmemory (ever since 6715df8d5) but, before this patch, these accesses\nwere permitted inconsistently. In particular, accesses were permitted\nabove state-\u003eallocated_stack, but not below it. In other words, if the\nstack was already \"large enough\", the access was permitted, but\notherwise the access was rejected instead of being allowed to \"grow the\nstack\". This undesired rejection was happening in two places:\n- in check_stack_slot_within_bounds()\n- in check_stack_range_initialized()\nThis patch arranges for these accesses to be permitted. A bunch of tests\nthat were relying on the old rejection had to change; all of them were\nchanged to add also run unprivileged, in which case the old behavior\npersists. One tests couldn\u0027t be updated - global_func16 - because it\ncan\u0027t run unprivileged for other reasons.\n\nThis patch also fixes the tracking of the stack size for variable-offset\nreads. This second fix is bundled in the same commit as the first one\nbecause they\u0027re inter-related. Before this patch, writes to the stack\nusing registers containing a variable offset (as opposed to registers\nwith fixed, known values) were not properly contributing to the\nfunction\u0027s needed stack size. As a result, it was possible for a program\nto verify, but then to attempt to read out-of-bounds data at runtime\nbecause a too small stack had been allocated for it.\n\nEach function tracks the size of the stack it needs in\nbpf_subprog_info.stack_depth, which is maintained by\nupdate_stack_depth(). For regular memory accesses, check_mem_access()\nwas calling update_state_depth() but it was passing in only the fixed\npart of the offset register, ignoring the variable offset. This was\nincorrect; the minimum possible value of that register should be used\ninstead.\n\nThis tracking is now fixed by centralizing the tracking of stack size in\ngrow_stack_state(), and by lifting the calls to grow_stack_state() to\ncheck_stack_access_within_bounds() as suggested by Andrii. The code is\nnow simpler and more convincingly tracks the correct maximum stack size.\ncheck_stack_range_initialized() can now rely on enough stack having been\nallocated for the access; this helps with the fix for the first issue.\n\nA few tests were changed to also check the stack depth computation. The\none that fails without this patch is verifier_var_off:stack_write_priv_vs_unpriv.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52452",
"url": "https://www.suse.com/security/cve/CVE-2023-52452"
},
{
"category": "external",
"summary": "SUSE Bug 1220257 for CVE-2023-52452",
"url": "https://bugzilla.suse.com/1220257"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-22T14:33:44Z",
"details": "moderate"
}
],
"title": "CVE-2023-52452"
},
{
"cve": "CVE-2023-52456",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52456"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nserial: imx: fix tx statemachine deadlock\n\nWhen using the serial port as RS485 port, the tx statemachine is used to\ncontrol the RTS pin to drive the RS485 transceiver TX_EN pin. When the\nTTY port is closed in the middle of a transmission (for instance during\nuserland application crash), imx_uart_shutdown disables the interface\nand disables the Transmission Complete interrupt. afer that,\nimx_uart_stop_tx bails on an incomplete transmission, to be retriggered\nby the TC interrupt. This interrupt is disabled and therefore the tx\nstatemachine never transitions out of SEND. The statemachine is in\ndeadlock now, and the TX_EN remains low, making the interface useless.\n\nimx_uart_stop_tx now checks for incomplete transmission AND whether TC\ninterrupts are enabled before bailing to be retriggered. This makes sure\nthe state machine handling is reached, and is properly set to\nWAIT_AFTER_SEND.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52456",
"url": "https://www.suse.com/security/cve/CVE-2023-52456"
},
{
"category": "external",
"summary": "SUSE Bug 1220364 for CVE-2023-52456",
"url": "https://bugzilla.suse.com/1220364"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-22T14:33:44Z",
"details": "moderate"
}
],
"title": "CVE-2023-52456"
},
{
"cve": "CVE-2023-52457",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52457"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nserial: 8250: omap: Don\u0027t skip resource freeing if pm_runtime_resume_and_get() failed\n\nReturning an error code from .remove() makes the driver core emit the\nlittle helpful error message:\n\n\tremove callback returned a non-zero value. This will be ignored.\n\nand then remove the device anyhow. So all resources that were not freed\nare leaked in this case. Skipping serial8250_unregister_port() has the\npotential to keep enough of the UART around to trigger a use-after-free.\n\nSo replace the error return (and with it the little helpful error\nmessage) by a more useful error message and continue to cleanup.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52457",
"url": "https://www.suse.com/security/cve/CVE-2023-52457"
},
{
"category": "external",
"summary": "SUSE Bug 1220350 for CVE-2023-52457",
"url": "https://bugzilla.suse.com/1220350"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-22T14:33:44Z",
"details": "moderate"
}
],
"title": "CVE-2023-52457"
},
{
"cve": "CVE-2023-52463",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52463"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nefivarfs: force RO when remounting if SetVariable is not supported\n\nIf SetVariable at runtime is not supported by the firmware we never assign\na callback for that function. At the same time mount the efivarfs as\nRO so no one can call that. However, we never check the permission flags\nwhen someone remounts the filesystem as RW. As a result this leads to a\ncrash looking like this:\n\n$ mount -o remount,rw /sys/firmware/efi/efivars\n$ efi-updatevar -f PK.auth PK\n\n[ 303.279166] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000000\n[ 303.280482] Mem abort info:\n[ 303.280854] ESR = 0x0000000086000004\n[ 303.281338] EC = 0x21: IABT (current EL), IL = 32 bits\n[ 303.282016] SET = 0, FnV = 0\n[ 303.282414] EA = 0, S1PTW = 0\n[ 303.282821] FSC = 0x04: level 0 translation fault\n[ 303.283771] user pgtable: 4k pages, 48-bit VAs, pgdp=000000004258c000\n[ 303.284913] [0000000000000000] pgd=0000000000000000, p4d=0000000000000000\n[ 303.286076] Internal error: Oops: 0000000086000004 [#1] PREEMPT SMP\n[ 303.286936] Modules linked in: qrtr tpm_tis tpm_tis_core crct10dif_ce arm_smccc_trng rng_core drm fuse ip_tables x_tables ipv6\n[ 303.288586] CPU: 1 PID: 755 Comm: efi-updatevar Not tainted 6.3.0-rc1-00108-gc7d0c4695c68 #1\n[ 303.289748] Hardware name: Unknown Unknown Product/Unknown Product, BIOS 2023.04-00627-g88336918701d 04/01/2023\n[ 303.291150] pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n[ 303.292123] pc : 0x0\n[ 303.292443] lr : efivar_set_variable_locked+0x74/0xec\n[ 303.293156] sp : ffff800008673c10\n[ 303.293619] x29: ffff800008673c10 x28: ffff0000037e8000 x27: 0000000000000000\n[ 303.294592] x26: 0000000000000800 x25: ffff000002467400 x24: 0000000000000027\n[ 303.295572] x23: ffffd49ea9832000 x22: ffff0000020c9800 x21: ffff000002467000\n[ 303.296566] x20: 0000000000000001 x19: 00000000000007fc x18: 0000000000000000\n[ 303.297531] x17: 0000000000000000 x16: 0000000000000000 x15: 0000aaaac807ab54\n[ 303.298495] x14: ed37489f673633c0 x13: 71c45c606de13f80 x12: 47464259e219acf4\n[ 303.299453] x11: ffff000002af7b01 x10: 0000000000000003 x9 : 0000000000000002\n[ 303.300431] x8 : 0000000000000010 x7 : ffffd49ea8973230 x6 : 0000000000a85201\n[ 303.301412] x5 : 0000000000000000 x4 : ffff0000020c9800 x3 : 00000000000007fc\n[ 303.302370] x2 : 0000000000000027 x1 : ffff000002467400 x0 : ffff000002467000\n[ 303.303341] Call trace:\n[ 303.303679] 0x0\n[ 303.303938] efivar_entry_set_get_size+0x98/0x16c\n[ 303.304585] efivarfs_file_write+0xd0/0x1a4\n[ 303.305148] vfs_write+0xc4/0x2e4\n[ 303.305601] ksys_write+0x70/0x104\n[ 303.306073] __arm64_sys_write+0x1c/0x28\n[ 303.306622] invoke_syscall+0x48/0x114\n[ 303.307156] el0_svc_common.constprop.0+0x44/0xec\n[ 303.307803] do_el0_svc+0x38/0x98\n[ 303.308268] el0_svc+0x2c/0x84\n[ 303.308702] el0t_64_sync_handler+0xf4/0x120\n[ 303.309293] el0t_64_sync+0x190/0x194\n[ 303.309794] Code: ???????? ???????? ???????? ???????? (????????)\n[ 303.310612] ---[ end trace 0000000000000000 ]---\n\nFix this by adding a .reconfigure() function to the fs operations which\nwe can use to check the requested flags and deny anything that\u0027s not RO\nif the firmware doesn\u0027t implement SetVariable at runtime.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52463",
"url": "https://www.suse.com/security/cve/CVE-2023-52463"
},
{
"category": "external",
"summary": "SUSE Bug 1220328 for CVE-2023-52463",
"url": "https://bugzilla.suse.com/1220328"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-22T14:33:44Z",
"details": "moderate"
}
],
"title": "CVE-2023-52463"
},
{
"cve": "CVE-2023-52464",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52464"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nEDAC/thunderx: Fix possible out-of-bounds string access\n\nEnabling -Wstringop-overflow globally exposes a warning for a common bug\nin the usage of strncat():\n\n drivers/edac/thunderx_edac.c: In function \u0027thunderx_ocx_com_threaded_isr\u0027:\n drivers/edac/thunderx_edac.c:1136:17: error: \u0027strncat\u0027 specified bound 1024 equals destination size [-Werror=stringop-overflow=]\n 1136 | strncat(msg, other, OCX_MESSAGE_SIZE);\n | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~\n ...\n 1145 | strncat(msg, other, OCX_MESSAGE_SIZE);\n ...\n 1150 | strncat(msg, other, OCX_MESSAGE_SIZE);\n\n ...\n\nApparently the author of this driver expected strncat() to behave the\nway that strlcat() does, which uses the size of the destination buffer\nas its third argument rather than the length of the source buffer. The\nresult is that there is no check on the size of the allocated buffer.\n\nChange it to strlcat().\n\n [ bp: Trim compiler output, fixup commit message. ]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52464",
"url": "https://www.suse.com/security/cve/CVE-2023-52464"
},
{
"category": "external",
"summary": "SUSE Bug 1220330 for CVE-2023-52464",
"url": "https://bugzilla.suse.com/1220330"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-22T14:33:44Z",
"details": "moderate"
}
],
"title": "CVE-2023-52464"
},
{
"cve": "CVE-2023-52467",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52467"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmfd: syscon: Fix null pointer dereference in of_syscon_register()\n\nkasprintf() returns a pointer to dynamically allocated memory\nwhich can be NULL upon failure.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52467",
"url": "https://www.suse.com/security/cve/CVE-2023-52467"
},
{
"category": "external",
"summary": "SUSE Bug 1220433 for CVE-2023-52467",
"url": "https://bugzilla.suse.com/1220433"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-22T14:33:44Z",
"details": "moderate"
}
],
"title": "CVE-2023-52467"
},
{
"cve": "CVE-2023-52475",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52475"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nInput: powermate - fix use-after-free in powermate_config_complete\n\nsyzbot has found a use-after-free bug [1] in the powermate driver. This\nhappens when the device is disconnected, which leads to a memory free from\nthe powermate_device struct. When an asynchronous control message\ncompletes after the kfree and its callback is invoked, the lock does not\nexist anymore and hence the bug.\n\nUse usb_kill_urb() on pm-\u003econfig to cancel any in-progress requests upon\ndevice disconnection.\n\n[1] https://syzkaller.appspot.com/bug?extid=0434ac83f907a1dbdd1e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52475",
"url": "https://www.suse.com/security/cve/CVE-2023-52475"
},
{
"category": "external",
"summary": "SUSE Bug 1220649 for CVE-2023-52475",
"url": "https://bugzilla.suse.com/1220649"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-22T14:33:44Z",
"details": "moderate"
}
],
"title": "CVE-2023-52475"
},
{
"cve": "CVE-2023-52478",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52478"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: logitech-hidpp: Fix kernel crash on receiver USB disconnect\n\nhidpp_connect_event() has *four* time-of-check vs time-of-use (TOCTOU)\nraces when it races with itself.\n\nhidpp_connect_event() primarily runs from a workqueue but it also runs\non probe() and if a \"device-connected\" packet is received by the hw\nwhen the thread running hidpp_connect_event() from probe() is waiting on\nthe hw, then a second thread running hidpp_connect_event() will be\nstarted from the workqueue.\n\nThis opens the following races (note the below code is simplified):\n\n1. Retrieving + printing the protocol (harmless race):\n\n\tif (!hidpp-\u003eprotocol_major) {\n\t\thidpp_root_get_protocol_version()\n\t\thidpp-\u003eprotocol_major = response.rap.params[0];\n\t}\n\nWe can actually see this race hit in the dmesg in the abrt output\nattached to rhbz#2227968:\n\n[ 3064.624215] logitech-hidpp-device 0003:046D:4071.0049: HID++ 4.5 device connected.\n[ 3064.658184] logitech-hidpp-device 0003:046D:4071.0049: HID++ 4.5 device connected.\n\nTesting with extra logging added has shown that after this the 2 threads\ntake turn grabbing the hw access mutex (send_mutex) so they ping-pong\nthrough all the other TOCTOU cases managing to hit all of them:\n\n2. Updating the name to the HIDPP name (harmless race):\n\n\tif (hidpp-\u003ename == hdev-\u003ename) {\n\t\t...\n\t\thidpp-\u003ename = new_name;\n\t}\n\n3. Initializing the power_supply class for the battery (problematic!):\n\nhidpp_initialize_battery()\n{\n if (hidpp-\u003ebattery.ps)\n return 0;\n\n\tprobe_battery(); /* Blocks, threads take turns executing this */\n\n\thidpp-\u003ebattery.desc.properties =\n\t\tdevm_kmemdup(dev, hidpp_battery_props, cnt, GFP_KERNEL);\n\n\thidpp-\u003ebattery.ps =\n\t\tdevm_power_supply_register(\u0026hidpp-\u003ehid_dev-\u003edev,\n\t\t\t\t\t \u0026hidpp-\u003ebattery.desc, cfg);\n}\n\n4. Creating delayed input_device (potentially problematic):\n\n\tif (hidpp-\u003edelayed_input)\n\t\treturn;\n\n\thidpp-\u003edelayed_input = hidpp_allocate_input(hdev);\n\nThe really big problem here is 3. Hitting the race leads to the following\nsequence:\n\n\thidpp-\u003ebattery.desc.properties =\n\t\tdevm_kmemdup(dev, hidpp_battery_props, cnt, GFP_KERNEL);\n\n\thidpp-\u003ebattery.ps =\n\t\tdevm_power_supply_register(\u0026hidpp-\u003ehid_dev-\u003edev,\n\t\t\t\t\t \u0026hidpp-\u003ebattery.desc, cfg);\n\n\t...\n\n\thidpp-\u003ebattery.desc.properties =\n\t\tdevm_kmemdup(dev, hidpp_battery_props, cnt, GFP_KERNEL);\n\n\thidpp-\u003ebattery.ps =\n\t\tdevm_power_supply_register(\u0026hidpp-\u003ehid_dev-\u003edev,\n\t\t\t\t\t \u0026hidpp-\u003ebattery.desc, cfg);\n\nSo now we have registered 2 power supplies for the same battery,\nwhich looks a bit weird from userspace\u0027s pov but this is not even\nthe really big problem.\n\nNotice how:\n\n1. This is all devm-maganaged\n2. The hidpp-\u003ebattery.desc struct is shared between the 2 power supplies\n3. hidpp-\u003ebattery.desc.properties points to the result from the second\n devm_kmemdup()\n\nThis causes a use after free scenario on USB disconnect of the receiver:\n1. The last registered power supply class device gets unregistered\n2. The memory from the last devm_kmemdup() call gets freed,\n hidpp-\u003ebattery.desc.properties now points to freed memory\n3. The first registered power supply class device gets unregistered,\n this involves sending a remove uevent to userspace which invokes\n power_supply_uevent() to fill the uevent data\n4. power_supply_uevent() uses hidpp-\u003ebattery.desc.properties which\n now points to freed memory leading to backtraces like this one:\n\nSep 22 20:01:35 eric kernel: BUG: unable to handle page fault for address: ffffb2140e017f08\n...\nSep 22 20:01:35 eric kernel: Workqueue: usb_hub_wq hub_event\nSep 22 20:01:35 eric kernel: RIP: 0010:power_supply_uevent+0xee/0x1d0\n...\nSep 22 20:01:35 eric kernel: ? asm_exc_page_fault+0x26/0x30\nSep 22 20:01:35 eric kernel: ? power_supply_uevent+0xee/0x1d0\nSep 22 20:01:35 eric kernel: ? power_supply_uevent+0x10d/0x1d0\nSep 22 20:01:35 eric kernel: dev_uevent+0x10f/0x2d0\nSep 22 20:01:35 eric kernel: kobject_uevent_env+0x291/0x680\nSep 22 20:01:35 eric kernel: \n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52478",
"url": "https://www.suse.com/security/cve/CVE-2023-52478"
},
{
"category": "external",
"summary": "SUSE Bug 1220796 for CVE-2023-52478",
"url": "https://bugzilla.suse.com/1220796"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-22T14:33:44Z",
"details": "moderate"
}
],
"title": "CVE-2023-52478"
},
{
"cve": "CVE-2023-52482",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52482"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86/srso: Add SRSO mitigation for Hygon processors\n\nAdd mitigation for the speculative return stack overflow vulnerability\nwhich exists on Hygon processors too.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52482",
"url": "https://www.suse.com/security/cve/CVE-2023-52482"
},
{
"category": "external",
"summary": "SUSE Bug 1220735 for CVE-2023-52482",
"url": "https://bugzilla.suse.com/1220735"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-22T14:33:44Z",
"details": "moderate"
}
],
"title": "CVE-2023-52482"
},
{
"cve": "CVE-2023-52484",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52484"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\niommu/arm-smmu-v3: Fix soft lockup triggered by arm_smmu_mm_invalidate_range\n\nWhen running an SVA case, the following soft lockup is triggered:\n--------------------------------------------------------------------\nwatchdog: BUG: soft lockup - CPU#244 stuck for 26s!\npstate: 83400009 (Nzcv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--)\npc : arm_smmu_cmdq_issue_cmdlist+0x178/0xa50\nlr : arm_smmu_cmdq_issue_cmdlist+0x150/0xa50\nsp : ffff8000d83ef290\nx29: ffff8000d83ef290 x28: 000000003b9aca00 x27: 0000000000000000\nx26: ffff8000d83ef3c0 x25: da86c0812194a0e8 x24: 0000000000000000\nx23: 0000000000000040 x22: ffff8000d83ef340 x21: ffff0000c63980c0\nx20: 0000000000000001 x19: ffff0000c6398080 x18: 0000000000000000\nx17: 0000000000000000 x16: 0000000000000000 x15: ffff3000b4a3bbb0\nx14: ffff3000b4a30888 x13: ffff3000b4a3cf60 x12: 0000000000000000\nx11: 0000000000000000 x10: 0000000000000000 x9 : ffffc08120e4d6bc\nx8 : 0000000000000000 x7 : 0000000000000000 x6 : 0000000000048cfa\nx5 : 0000000000000000 x4 : 0000000000000001 x3 : 000000000000000a\nx2 : 0000000080000000 x1 : 0000000000000000 x0 : 0000000000000001\nCall trace:\n arm_smmu_cmdq_issue_cmdlist+0x178/0xa50\n __arm_smmu_tlb_inv_range+0x118/0x254\n arm_smmu_tlb_inv_range_asid+0x6c/0x130\n arm_smmu_mm_invalidate_range+0xa0/0xa4\n __mmu_notifier_invalidate_range_end+0x88/0x120\n unmap_vmas+0x194/0x1e0\n unmap_region+0xb4/0x144\n do_mas_align_munmap+0x290/0x490\n do_mas_munmap+0xbc/0x124\n __vm_munmap+0xa8/0x19c\n __arm64_sys_munmap+0x28/0x50\n invoke_syscall+0x78/0x11c\n el0_svc_common.constprop.0+0x58/0x1c0\n do_el0_svc+0x34/0x60\n el0_svc+0x2c/0xd4\n el0t_64_sync_handler+0x114/0x140\n el0t_64_sync+0x1a4/0x1a8\n--------------------------------------------------------------------\n\nNote that since 6.6-rc1 the arm_smmu_mm_invalidate_range above is renamed\nto \"arm_smmu_mm_arch_invalidate_secondary_tlbs\", yet the problem remains.\n\nThe commit 06ff87bae8d3 (\"arm64: mm: remove unused functions and variable\nprotoypes\") fixed a similar lockup on the CPU MMU side. Yet, it can occur\nto SMMU too, since arm_smmu_mm_arch_invalidate_secondary_tlbs() is called\ntypically next to MMU tlb flush function, e.g.\n\ttlb_flush_mmu_tlbonly {\n\t\ttlb_flush {\n\t\t\t__flush_tlb_range {\n\t\t\t\t// check MAX_TLBI_OPS\n\t\t\t}\n\t\t}\n\t\tmmu_notifier_arch_invalidate_secondary_tlbs {\n\t\t\tarm_smmu_mm_arch_invalidate_secondary_tlbs {\n\t\t\t\t// does not check MAX_TLBI_OPS\n\t\t\t}\n\t\t}\n\t}\n\nClone a CMDQ_MAX_TLBI_OPS from the MAX_TLBI_OPS in tlbflush.h, since in an\nSVA case SMMU uses the CPU page table, so it makes sense to align with the\ntlbflush code. Then, replace per-page TLBI commands with a single per-asid\nTLBI command, if the request size hits this threshold.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52484",
"url": "https://www.suse.com/security/cve/CVE-2023-52484"
},
{
"category": "external",
"summary": "SUSE Bug 1220797 for CVE-2023-52484",
"url": "https://bugzilla.suse.com/1220797"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-22T14:33:44Z",
"details": "moderate"
}
],
"title": "CVE-2023-52484"
},
{
"cve": "CVE-2023-52530",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52530"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mac80211: fix potential key use-after-free\n\nWhen ieee80211_key_link() is called by ieee80211_gtk_rekey_add()\nbut returns 0 due to KRACK protection (identical key reinstall),\nieee80211_gtk_rekey_add() will still return a pointer into the\nkey, in a potential use-after-free. This normally doesn\u0027t happen\nsince it\u0027s only called by iwlwifi in case of WoWLAN rekey offload\nwhich has its own KRACK protection, but still better to fix, do\nthat by returning an error code and converting that to success on\nthe cfg80211 boundary only, leaving the error for bad callers of\nieee80211_gtk_rekey_add().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52530",
"url": "https://www.suse.com/security/cve/CVE-2023-52530"
},
{
"category": "external",
"summary": "SUSE Bug 1220930 for CVE-2023-52530",
"url": "https://bugzilla.suse.com/1220930"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-22T14:33:44Z",
"details": "moderate"
}
],
"title": "CVE-2023-52530"
},
{
"cve": "CVE-2023-52531",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52531"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: iwlwifi: mvm: Fix a memory corruption issue\n\nA few lines above, space is kzalloc()\u0027ed for:\n\tsizeof(struct iwl_nvm_data) +\n\tsizeof(struct ieee80211_channel) +\n\tsizeof(struct ieee80211_rate)\n\n\u0027mvm-\u003envm_data\u0027 is a \u0027struct iwl_nvm_data\u0027, so it is fine.\n\nAt the end of this structure, there is the \u0027channels\u0027 flex array.\nEach element is of type \u0027struct ieee80211_channel\u0027.\nSo only 1 element is allocated in this array.\n\nWhen doing:\n mvm-\u003envm_data-\u003ebands[0].channels = mvm-\u003envm_data-\u003echannels;\nWe point at the first element of the \u0027channels\u0027 flex array.\nSo this is fine.\n\nHowever, when doing:\n mvm-\u003envm_data-\u003ebands[0].bitrates =\n\t\t\t(void *)((u8 *)mvm-\u003envm_data-\u003echannels + 1);\nbecause of the \"(u8 *)\" cast, we add only 1 to the address of the beginning\nof the flex array.\n\nIt is likely that we want point at the \u0027struct ieee80211_rate\u0027 allocated\njust after.\n\nRemove the spurious casting so that the pointer arithmetic works as\nexpected.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52531",
"url": "https://www.suse.com/security/cve/CVE-2023-52531"
},
{
"category": "external",
"summary": "SUSE Bug 1220931 for CVE-2023-52531",
"url": "https://bugzilla.suse.com/1220931"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-22T14:33:44Z",
"details": "moderate"
}
],
"title": "CVE-2023-52531"
},
{
"cve": "CVE-2023-52559",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52559"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\niommu/vt-d: Avoid memory allocation in iommu_suspend()\n\nThe iommu_suspend() syscore suspend callback is invoked with IRQ disabled.\nAllocating memory with the GFP_KERNEL flag may re-enable IRQs during\nthe suspend callback, which can cause intermittent suspend/hibernation\nproblems with the following kernel traces:\n\nCalling iommu_suspend+0x0/0x1d0\n------------[ cut here ]------------\nWARNING: CPU: 0 PID: 15 at kernel/time/timekeeping.c:868 ktime_get+0x9b/0xb0\n...\nCPU: 0 PID: 15 Comm: rcu_preempt Tainted: G U E 6.3-intel #r1\nRIP: 0010:ktime_get+0x9b/0xb0\n...\nCall Trace:\n \u003cIRQ\u003e\n tick_sched_timer+0x22/0x90\n ? __pfx_tick_sched_timer+0x10/0x10\n __hrtimer_run_queues+0x111/0x2b0\n hrtimer_interrupt+0xfa/0x230\n __sysvec_apic_timer_interrupt+0x63/0x140\n sysvec_apic_timer_interrupt+0x7b/0xa0\n \u003c/IRQ\u003e\n \u003cTASK\u003e\n asm_sysvec_apic_timer_interrupt+0x1f/0x30\n...\n------------[ cut here ]------------\nInterrupts enabled after iommu_suspend+0x0/0x1d0\nWARNING: CPU: 0 PID: 27420 at drivers/base/syscore.c:68 syscore_suspend+0x147/0x270\nCPU: 0 PID: 27420 Comm: rtcwake Tainted: G U W E 6.3-intel #r1\nRIP: 0010:syscore_suspend+0x147/0x270\n...\nCall Trace:\n \u003cTASK\u003e\n hibernation_snapshot+0x25b/0x670\n hibernate+0xcd/0x390\n state_store+0xcf/0xe0\n kobj_attr_store+0x13/0x30\n sysfs_kf_write+0x3f/0x50\n kernfs_fop_write_iter+0x128/0x200\n vfs_write+0x1fd/0x3c0\n ksys_write+0x6f/0xf0\n __x64_sys_write+0x1d/0x30\n do_syscall_64+0x3b/0x90\n entry_SYSCALL_64_after_hwframe+0x72/0xdc\n\nGiven that only 4 words memory is needed, avoid the memory allocation in\niommu_suspend().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52559",
"url": "https://www.suse.com/security/cve/CVE-2023-52559"
},
{
"category": "external",
"summary": "SUSE Bug 1220933 for CVE-2023-52559",
"url": "https://bugzilla.suse.com/1220933"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-22T14:33:44Z",
"details": "moderate"
}
],
"title": "CVE-2023-52559"
},
{
"cve": "CVE-2023-6270",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-6270"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the ATA over Ethernet (AoE) driver in the Linux kernel. The aoecmd_cfg_pkts() function improperly updates the refcnt on `struct net_device`, and a use-after-free can be triggered by racing between the free on the struct and the access through the `skbtxq` global queue. This could lead to a denial of service condition or potential code execution.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-6270",
"url": "https://www.suse.com/security/cve/CVE-2023-6270"
},
{
"category": "external",
"summary": "SUSE Bug 1218562 for CVE-2023-6270",
"url": "https://bugzilla.suse.com/1218562"
},
{
"category": "external",
"summary": "SUSE Bug 1218813 for CVE-2023-6270",
"url": "https://bugzilla.suse.com/1218813"
},
{
"category": "external",
"summary": "SUSE Bug 1221578 for CVE-2023-6270",
"url": "https://bugzilla.suse.com/1221578"
},
{
"category": "external",
"summary": "SUSE Bug 1221598 for CVE-2023-6270",
"url": "https://bugzilla.suse.com/1221598"
},
{
"category": "external",
"summary": "SUSE Bug 1223016 for CVE-2023-6270",
"url": "https://bugzilla.suse.com/1223016"
},
{
"category": "external",
"summary": "SUSE Bug 1227675 for CVE-2023-6270",
"url": "https://bugzilla.suse.com/1227675"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-22T14:33:44Z",
"details": "moderate"
}
],
"title": "CVE-2023-6270"
},
{
"cve": "CVE-2023-6817",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-6817"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free vulnerability in the Linux kernel\u0027s netfilter: nf_tables component can be exploited to achieve local privilege escalation.\n\nThe function nft_pipapo_walk did not skip inactive elements during set walk which could lead double deactivations of PIPAPO (Pile Packet Policies) elements, leading to use-after-free.\n\nWe recommend upgrading past commit 317eb9685095678f2c9f5a8189de698c5354316a.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-6817",
"url": "https://www.suse.com/security/cve/CVE-2023-6817"
},
{
"category": "external",
"summary": "SUSE Bug 1218195 for CVE-2023-6817",
"url": "https://bugzilla.suse.com/1218195"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-22T14:33:44Z",
"details": "moderate"
}
],
"title": "CVE-2023-6817"
},
{
"cve": "CVE-2024-0607",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-0607"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Netfilter subsystem in the Linux kernel. The issue is in the nft_byteorder_eval() function, where the code iterates through a loop and writes to the `dst` array. On each iteration, 8 bytes are written, but `dst` is an array of u32, so each element only has space for 4 bytes. That means every iteration overwrites part of the previous element corrupting this array of u32. This flaw allows a local user to cause a denial of service or potentially break NetFilter functionality.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-0607",
"url": "https://www.suse.com/security/cve/CVE-2024-0607"
},
{
"category": "external",
"summary": "SUSE Bug 1218915 for CVE-2024-0607",
"url": "https://bugzilla.suse.com/1218915"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-22T14:33:44Z",
"details": "moderate"
}
],
"title": "CVE-2024-0607"
},
{
"cve": "CVE-2024-1151",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-1151"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was reported in the Open vSwitch sub-component in the Linux Kernel. The flaw occurs when a recursive operation of code push recursively calls into the code block. The OVS module does not validate the stack depth, pushing too many frames and causing a stack overflow. As a result, this can lead to a crash or other related issues.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-1151",
"url": "https://www.suse.com/security/cve/CVE-2024-1151"
},
{
"category": "external",
"summary": "SUSE Bug 1219835 for CVE-2024-1151",
"url": "https://bugzilla.suse.com/1219835"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-22T14:33:44Z",
"details": "moderate"
}
],
"title": "CVE-2024-1151"
},
{
"cve": "CVE-2024-23849",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-23849"
}
],
"notes": [
{
"category": "general",
"text": "In rds_recv_track_latency in net/rds/af_rds.c in the Linux kernel through 6.7.1, there is an off-by-one error for an RDS_MSG_RX_DGRAM_TRACE_MAX comparison, resulting in out-of-bounds access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-23849",
"url": "https://www.suse.com/security/cve/CVE-2024-23849"
},
{
"category": "external",
"summary": "SUSE Bug 1219127 for CVE-2024-23849",
"url": "https://bugzilla.suse.com/1219127"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-22T14:33:44Z",
"details": "moderate"
}
],
"title": "CVE-2024-23849"
},
{
"cve": "CVE-2024-23850",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-23850"
}
],
"notes": [
{
"category": "general",
"text": "In btrfs_get_root_ref in fs/btrfs/disk-io.c in the Linux kernel through 6.7.1, there can be an assertion failure and crash because a subvolume can be read out too soon after its root item is inserted upon subvolume creation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-23850",
"url": "https://www.suse.com/security/cve/CVE-2024-23850"
},
{
"category": "external",
"summary": "SUSE Bug 1219126 for CVE-2024-23850",
"url": "https://bugzilla.suse.com/1219126"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-22T14:33:44Z",
"details": "moderate"
}
],
"title": "CVE-2024-23850"
},
{
"cve": "CVE-2024-23851",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-23851"
}
],
"notes": [
{
"category": "general",
"text": "copy_params in drivers/md/dm-ioctl.c in the Linux kernel through 6.7.1 can attempt to allocate more than INT_MAX bytes, and crash, because of a missing param_kernel-\u003edata_size check. This is related to ctl_ioctl.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-23851",
"url": "https://www.suse.com/security/cve/CVE-2024-23851"
},
{
"category": "external",
"summary": "SUSE Bug 1219146 for CVE-2024-23851",
"url": "https://bugzilla.suse.com/1219146"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-22T14:33:44Z",
"details": "moderate"
}
],
"title": "CVE-2024-23851"
},
{
"cve": "CVE-2024-26585",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26585"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntls: fix race between tx work scheduling and socket close\n\nSimilarly to previous commit, the submitting thread (recvmsg/sendmsg)\nmay exit as soon as the async crypto handler calls complete().\nReorder scheduling the work before calling complete().\nThis seems more logical in the first place, as it\u0027s\nthe inverse order of what the submitting thread will do.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26585",
"url": "https://www.suse.com/security/cve/CVE-2024-26585"
},
{
"category": "external",
"summary": "SUSE Bug 1220187 for CVE-2024-26585",
"url": "https://bugzilla.suse.com/1220187"
},
{
"category": "external",
"summary": "SUSE Bug 1220211 for CVE-2024-26585",
"url": "https://bugzilla.suse.com/1220211"
},
{
"category": "external",
"summary": "SUSE Bug 1224298 for CVE-2024-26585",
"url": "https://bugzilla.suse.com/1224298"
},
{
"category": "external",
"summary": "SUSE Bug 1224878 for CVE-2024-26585",
"url": "https://bugzilla.suse.com/1224878"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-22T14:33:44Z",
"details": "important"
}
],
"title": "CVE-2024-26585"
},
{
"cve": "CVE-2024-26586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26586"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmlxsw: spectrum_acl_tcam: Fix stack corruption\n\nWhen tc filters are first added to a net device, the corresponding local\nport gets bound to an ACL group in the device. The group contains a list\nof ACLs. In turn, each ACL points to a different TCAM region where the\nfilters are stored. During forwarding, the ACLs are sequentially\nevaluated until a match is found.\n\nOne reason to place filters in different regions is when they are added\nwith decreasing priorities and in an alternating order so that two\nconsecutive filters can never fit in the same region because of their\nkey usage.\n\nIn Spectrum-2 and newer ASICs the firmware started to report that the\nmaximum number of ACLs in a group is more than 16, but the layout of the\nregister that configures ACL groups (PAGT) was not updated to account\nfor that. It is therefore possible to hit stack corruption [1] in the\nrare case where more than 16 ACLs in a group are required.\n\nFix by limiting the maximum ACL group size to the minimum between what\nthe firmware reports and the maximum ACLs that fit in the PAGT register.\n\nAdd a test case to make sure the machine does not crash when this\ncondition is hit.\n\n[1]\nKernel panic - not syncing: stack-protector: Kernel stack is corrupted in: mlxsw_sp_acl_tcam_group_update+0x116/0x120\n[...]\n dump_stack_lvl+0x36/0x50\n panic+0x305/0x330\n __stack_chk_fail+0x15/0x20\n mlxsw_sp_acl_tcam_group_update+0x116/0x120\n mlxsw_sp_acl_tcam_group_region_attach+0x69/0x110\n mlxsw_sp_acl_tcam_vchunk_get+0x492/0xa20\n mlxsw_sp_acl_tcam_ventry_add+0x25/0xe0\n mlxsw_sp_acl_rule_add+0x47/0x240\n mlxsw_sp_flower_replace+0x1a9/0x1d0\n tc_setup_cb_add+0xdc/0x1c0\n fl_hw_replace_filter+0x146/0x1f0\n fl_change+0xc17/0x1360\n tc_new_tfilter+0x472/0xb90\n rtnetlink_rcv_msg+0x313/0x3b0\n netlink_rcv_skb+0x58/0x100\n netlink_unicast+0x244/0x390\n netlink_sendmsg+0x1e4/0x440\n ____sys_sendmsg+0x164/0x260\n ___sys_sendmsg+0x9a/0xe0\n __sys_sendmsg+0x7a/0xc0\n do_syscall_64+0x40/0xe0\n entry_SYSCALL_64_after_hwframe+0x63/0x6b",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26586",
"url": "https://www.suse.com/security/cve/CVE-2024-26586"
},
{
"category": "external",
"summary": "SUSE Bug 1220243 for CVE-2024-26586",
"url": "https://bugzilla.suse.com/1220243"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-22T14:33:44Z",
"details": "moderate"
}
],
"title": "CVE-2024-26586"
},
{
"cve": "CVE-2024-26589",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26589"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Reject variable offset alu on PTR_TO_FLOW_KEYS\n\nFor PTR_TO_FLOW_KEYS, check_flow_keys_access() only uses fixed off\nfor validation. However, variable offset ptr alu is not prohibited\nfor this ptr kind. So the variable offset is not checked.\n\nThe following prog is accepted:\n\n func#0 @0\n 0: R1=ctx() R10=fp0\n 0: (bf) r6 = r1 ; R1=ctx() R6_w=ctx()\n 1: (79) r7 = *(u64 *)(r6 +144) ; R6_w=ctx() R7_w=flow_keys()\n 2: (b7) r8 = 1024 ; R8_w=1024\n 3: (37) r8 /= 1 ; R8_w=scalar()\n 4: (57) r8 \u0026= 1024 ; R8_w=scalar(smin=smin32=0,\n smax=umax=smax32=umax32=1024,var_off=(0x0; 0x400))\n 5: (0f) r7 += r8\n mark_precise: frame0: last_idx 5 first_idx 0 subseq_idx -1\n mark_precise: frame0: regs=r8 stack= before 4: (57) r8 \u0026= 1024\n mark_precise: frame0: regs=r8 stack= before 3: (37) r8 /= 1\n mark_precise: frame0: regs=r8 stack= before 2: (b7) r8 = 1024\n 6: R7_w=flow_keys(smin=smin32=0,smax=umax=smax32=umax32=1024,var_off\n =(0x0; 0x400)) R8_w=scalar(smin=smin32=0,smax=umax=smax32=umax32=1024,\n var_off=(0x0; 0x400))\n 6: (79) r0 = *(u64 *)(r7 +0) ; R0_w=scalar()\n 7: (95) exit\n\nThis prog loads flow_keys to r7, and adds the variable offset r8\nto r7, and finally causes out-of-bounds access:\n\n BUG: unable to handle page fault for address: ffffc90014c80038\n [...]\n Call Trace:\n \u003cTASK\u003e\n bpf_dispatcher_nop_func include/linux/bpf.h:1231 [inline]\n __bpf_prog_run include/linux/filter.h:651 [inline]\n bpf_prog_run include/linux/filter.h:658 [inline]\n bpf_prog_run_pin_on_cpu include/linux/filter.h:675 [inline]\n bpf_flow_dissect+0x15f/0x350 net/core/flow_dissector.c:991\n bpf_prog_test_run_flow_dissector+0x39d/0x620 net/bpf/test_run.c:1359\n bpf_prog_test_run kernel/bpf/syscall.c:4107 [inline]\n __sys_bpf+0xf8f/0x4560 kernel/bpf/syscall.c:5475\n __do_sys_bpf kernel/bpf/syscall.c:5561 [inline]\n __se_sys_bpf kernel/bpf/syscall.c:5559 [inline]\n __x64_sys_bpf+0x73/0xb0 kernel/bpf/syscall.c:5559\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0x3f/0x110 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x63/0x6b\n\nFix this by rejecting ptr alu with variable offset on flow_keys.\nApplying the patch rejects the program with \"R7 pointer arithmetic\non flow_keys prohibited\".",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26589",
"url": "https://www.suse.com/security/cve/CVE-2024-26589"
},
{
"category": "external",
"summary": "SUSE Bug 1220255 for CVE-2024-26589",
"url": "https://bugzilla.suse.com/1220255"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-22T14:33:44Z",
"details": "moderate"
}
],
"title": "CVE-2024-26589"
},
{
"cve": "CVE-2024-26591",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26591"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Fix re-attachment branch in bpf_tracing_prog_attach\n\nThe following case can cause a crash due to missing attach_btf:\n\n1) load rawtp program\n2) load fentry program with rawtp as target_fd\n3) create tracing link for fentry program with target_fd = 0\n4) repeat 3\n\nIn the end we have:\n\n- prog-\u003eaux-\u003edst_trampoline == NULL\n- tgt_prog == NULL (because we did not provide target_fd to link_create)\n- prog-\u003eaux-\u003eattach_btf == NULL (the program was loaded with attach_prog_fd=X)\n- the program was loaded for tgt_prog but we have no way to find out which one\n\n BUG: kernel NULL pointer dereference, address: 0000000000000058\n Call Trace:\n \u003cTASK\u003e\n ? __die+0x20/0x70\n ? page_fault_oops+0x15b/0x430\n ? fixup_exception+0x22/0x330\n ? exc_page_fault+0x6f/0x170\n ? asm_exc_page_fault+0x22/0x30\n ? bpf_tracing_prog_attach+0x279/0x560\n ? btf_obj_id+0x5/0x10\n bpf_tracing_prog_attach+0x439/0x560\n __sys_bpf+0x1cf4/0x2de0\n __x64_sys_bpf+0x1c/0x30\n do_syscall_64+0x41/0xf0\n entry_SYSCALL_64_after_hwframe+0x6e/0x76\n\nReturn -EINVAL in this situation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26591",
"url": "https://www.suse.com/security/cve/CVE-2024-26591"
},
{
"category": "external",
"summary": "SUSE Bug 1220254 for CVE-2024-26591",
"url": "https://bugzilla.suse.com/1220254"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-22T14:33:44Z",
"details": "moderate"
}
],
"title": "CVE-2024-26591"
},
{
"cve": "CVE-2024-26593",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26593"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ni2c: i801: Fix block process call transactions\n\nAccording to the Intel datasheets, software must reset the block\nbuffer index twice for block process call transactions: once before\nwriting the outgoing data to the buffer, and once again before\nreading the incoming data from the buffer.\n\nThe driver is currently missing the second reset, causing the wrong\nportion of the block buffer to be read.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26593",
"url": "https://www.suse.com/security/cve/CVE-2024-26593"
},
{
"category": "external",
"summary": "SUSE Bug 1220009 for CVE-2024-26593",
"url": "https://bugzilla.suse.com/1220009"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-22T14:33:44Z",
"details": "moderate"
}
],
"title": "CVE-2024-26593"
},
{
"cve": "CVE-2024-26595",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26595"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmlxsw: spectrum_acl_tcam: Fix NULL pointer dereference in error path\n\nWhen calling mlxsw_sp_acl_tcam_region_destroy() from an error path after\nfailing to attach the region to an ACL group, we hit a NULL pointer\ndereference upon \u0027region-\u003egroup-\u003etcam\u0027 [1].\n\nFix by retrieving the \u0027tcam\u0027 pointer using mlxsw_sp_acl_to_tcam().\n\n[1]\nBUG: kernel NULL pointer dereference, address: 0000000000000000\n[...]\nRIP: 0010:mlxsw_sp_acl_tcam_region_destroy+0xa0/0xd0\n[...]\nCall Trace:\n mlxsw_sp_acl_tcam_vchunk_get+0x88b/0xa20\n mlxsw_sp_acl_tcam_ventry_add+0x25/0xe0\n mlxsw_sp_acl_rule_add+0x47/0x240\n mlxsw_sp_flower_replace+0x1a9/0x1d0\n tc_setup_cb_add+0xdc/0x1c0\n fl_hw_replace_filter+0x146/0x1f0\n fl_change+0xc17/0x1360\n tc_new_tfilter+0x472/0xb90\n rtnetlink_rcv_msg+0x313/0x3b0\n netlink_rcv_skb+0x58/0x100\n netlink_unicast+0x244/0x390\n netlink_sendmsg+0x1e4/0x440\n ____sys_sendmsg+0x164/0x260\n ___sys_sendmsg+0x9a/0xe0\n __sys_sendmsg+0x7a/0xc0\n do_syscall_64+0x40/0xe0\n entry_SYSCALL_64_after_hwframe+0x63/0x6b",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26595",
"url": "https://www.suse.com/security/cve/CVE-2024-26595"
},
{
"category": "external",
"summary": "SUSE Bug 1220344 for CVE-2024-26595",
"url": "https://bugzilla.suse.com/1220344"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-22T14:33:44Z",
"details": "moderate"
}
],
"title": "CVE-2024-26595"
},
{
"cve": "CVE-2024-26598",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26598"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache\n\nThere is a potential UAF scenario in the case of an LPI translation\ncache hit racing with an operation that invalidates the cache, such\nas a DISCARD ITS command. The root of the problem is that\nvgic_its_check_cache() does not elevate the refcount on the vgic_irq\nbefore dropping the lock that serializes refcount changes.\n\nHave vgic_its_check_cache() raise the refcount on the returned vgic_irq\nand add the corresponding decrement after queueing the interrupt.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26598",
"url": "https://www.suse.com/security/cve/CVE-2024-26598"
},
{
"category": "external",
"summary": "SUSE Bug 1220326 for CVE-2024-26598",
"url": "https://bugzilla.suse.com/1220326"
},
{
"category": "external",
"summary": "SUSE Bug 1221129 for CVE-2024-26598",
"url": "https://bugzilla.suse.com/1221129"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-22T14:33:44Z",
"details": "important"
}
],
"title": "CVE-2024-26598"
},
{
"cve": "CVE-2024-26602",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26602"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsched/membarrier: reduce the ability to hammer on sys_membarrier\n\nOn some systems, sys_membarrier can be very expensive, causing overall\nslowdowns for everything. So put a lock on the path in order to\nserialize the accesses to prevent the ability for this to be called at\ntoo high of a frequency and saturate the machine.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26602",
"url": "https://www.suse.com/security/cve/CVE-2024-26602"
},
{
"category": "external",
"summary": "SUSE Bug 1220398 for CVE-2024-26602",
"url": "https://bugzilla.suse.com/1220398"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-22T14:33:44Z",
"details": "moderate"
}
],
"title": "CVE-2024-26602"
},
{
"cve": "CVE-2024-26603",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26603"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86/fpu: Stop relying on userspace for info to fault in xsave buffer\n\nBefore this change, the expected size of the user space buffer was\ntaken from fx_sw-\u003exstate_size. fx_sw-\u003exstate_size can be changed\nfrom user-space, so it is possible construct a sigreturn frame where:\n\n * fx_sw-\u003exstate_size is smaller than the size required by valid bits in\n fx_sw-\u003exfeatures.\n * user-space unmaps parts of the sigrame fpu buffer so that not all of\n the buffer required by xrstor is accessible.\n\nIn this case, xrstor tries to restore and accesses the unmapped area\nwhich results in a fault. But fault_in_readable succeeds because buf +\nfx_sw-\u003exstate_size is within the still mapped area, so it goes back and\ntries xrstor again. It will spin in this loop forever.\n\nInstead, fault in the maximum size which can be touched by XRSTOR (taken\nfrom fpstate-\u003euser_size).\n\n[ dhansen: tweak subject / changelog ]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26603",
"url": "https://www.suse.com/security/cve/CVE-2024-26603"
},
{
"category": "external",
"summary": "SUSE Bug 1220335 for CVE-2024-26603",
"url": "https://bugzilla.suse.com/1220335"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-22T14:33:44Z",
"details": "moderate"
}
],
"title": "CVE-2024-26603"
},
{
"cve": "CVE-2024-26607",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26607"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/bridge: sii902x: Fix probing race issue\n\nA null pointer dereference crash has been observed rarely on TI\nplatforms using sii9022 bridge:\n\n[ 53.271356] sii902x_get_edid+0x34/0x70 [sii902x]\n[ 53.276066] sii902x_bridge_get_edid+0x14/0x20 [sii902x]\n[ 53.281381] drm_bridge_get_edid+0x20/0x34 [drm]\n[ 53.286305] drm_bridge_connector_get_modes+0x8c/0xcc [drm_kms_helper]\n[ 53.292955] drm_helper_probe_single_connector_modes+0x190/0x538 [drm_kms_helper]\n[ 53.300510] drm_client_modeset_probe+0x1f0/0xbd4 [drm]\n[ 53.305958] __drm_fb_helper_initial_config_and_unlock+0x50/0x510 [drm_kms_helper]\n[ 53.313611] drm_fb_helper_initial_config+0x48/0x58 [drm_kms_helper]\n[ 53.320039] drm_fbdev_dma_client_hotplug+0x84/0xd4 [drm_dma_helper]\n[ 53.326401] drm_client_register+0x5c/0xa0 [drm]\n[ 53.331216] drm_fbdev_dma_setup+0xc8/0x13c [drm_dma_helper]\n[ 53.336881] tidss_probe+0x128/0x264 [tidss]\n[ 53.341174] platform_probe+0x68/0xc4\n[ 53.344841] really_probe+0x188/0x3c4\n[ 53.348501] __driver_probe_device+0x7c/0x16c\n[ 53.352854] driver_probe_device+0x3c/0x10c\n[ 53.357033] __device_attach_driver+0xbc/0x158\n[ 53.361472] bus_for_each_drv+0x88/0xe8\n[ 53.365303] __device_attach+0xa0/0x1b4\n[ 53.369135] device_initial_probe+0x14/0x20\n[ 53.373314] bus_probe_device+0xb0/0xb4\n[ 53.377145] deferred_probe_work_func+0xcc/0x124\n[ 53.381757] process_one_work+0x1f0/0x518\n[ 53.385770] worker_thread+0x1e8/0x3dc\n[ 53.389519] kthread+0x11c/0x120\n[ 53.392750] ret_from_fork+0x10/0x20\n\nThe issue here is as follows:\n\n- tidss probes, but is deferred as sii902x is still missing.\n- sii902x starts probing and enters sii902x_init().\n- sii902x calls drm_bridge_add(). Now the sii902x bridge is ready from\n DRM\u0027s perspective.\n- sii902x calls sii902x_audio_codec_init() and\n platform_device_register_data()\n- The registration of the audio platform device causes probing of the\n deferred devices.\n- tidss probes, which eventually causes sii902x_bridge_get_edid() to be\n called.\n- sii902x_bridge_get_edid() tries to use the i2c to read the edid.\n However, the sii902x driver has not set up the i2c part yet, leading\n to the crash.\n\nFix this by moving the drm_bridge_add() to the end of the\nsii902x_init(), which is also at the very end of sii902x_probe().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26607",
"url": "https://www.suse.com/security/cve/CVE-2024-26607"
},
{
"category": "external",
"summary": "SUSE Bug 1220736 for CVE-2024-26607",
"url": "https://bugzilla.suse.com/1220736"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-22T14:33:44Z",
"details": "moderate"
}
],
"title": "CVE-2024-26607"
},
{
"cve": "CVE-2024-26622",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26622"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntomoyo: fix UAF write bug in tomoyo_write_control()\n\nSince tomoyo_write_control() updates head-\u003ewrite_buf when write()\nof long lines is requested, we need to fetch head-\u003ewrite_buf after\nhead-\u003eio_sem is held. Otherwise, concurrent write() requests can\ncause use-after-free-write and double-free problems.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26622",
"url": "https://www.suse.com/security/cve/CVE-2024-26622"
},
{
"category": "external",
"summary": "SUSE Bug 1220825 for CVE-2024-26622",
"url": "https://bugzilla.suse.com/1220825"
},
{
"category": "external",
"summary": "SUSE Bug 1220828 for CVE-2024-26622",
"url": "https://bugzilla.suse.com/1220828"
},
{
"category": "external",
"summary": "SUSE Bug 1224298 for CVE-2024-26622",
"url": "https://bugzilla.suse.com/1224298"
},
{
"category": "external",
"summary": "SUSE Bug 1224878 for CVE-2024-26622",
"url": "https://bugzilla.suse.com/1224878"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_71-rt-1-150400.1.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.71.1.noarch",
"openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.71.1.x86_64",
"openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.71.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-03-22T14:33:44Z",
"details": "important"
}
],
"title": "CVE-2024-26622"
}
]
}
ICSA-25-226-15
Vulnerability from csaf_cisa - Published: 2025-08-12 00:00 - Updated: 2025-08-12 00:00Notes
{
"document": {
"acknowledgments": [
{
"organization": "Siemens ProductCERT",
"summary": "reporting these vulnerabilities to CISA."
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited",
"tlp": {
"label": "WHITE",
"url": "https://us-cert.cisa.gov/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "SINEC OS before V3.1 contains third-party components with multiple vulnerabilities.\n\nSiemens has released new versions for the affected products and recommends to update to the latest versions.",
"title": "Summary"
},
{
"category": "general",
"text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity",
"title": "General Recommendations"
},
{
"category": "general",
"text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The use of Siemens Security Advisories is subject to the terms and conditions listed on: https://www.siemens.com/productcert/terms-of-use.",
"title": "Terms of Use"
},
{
"category": "legal_disclaimer",
"text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.",
"title": "Legal Notice"
},
{
"category": "other",
"text": "This ICSA is a verbatim republication of Siemens ProductCERT SSA-613116 from a direct conversion of the vendor\u0027s Common Security Advisory Framework (CSAF) advisory. This is republished to CISA\u0027s website as a means of increasing visibility and is provided \"as-is\" for informational purposes only. CISA is not responsible for the editorial or technical accuracy of republished advisories and provides no warranties of any kind regarding any information contained within this advisory. Further, CISA does not endorse any commercial product or service. Please contact Siemens ProductCERT directly for any questions regarding this advisory.",
"title": "Advisory Conversion Disclaimer"
},
{
"category": "other",
"text": "Critical Manufacturing, Transportation Systems, Energy, Healthcare and Public Health, Financial Services, Government Services and Facilities",
"title": "Critical infrastructure sectors"
},
{
"category": "other",
"text": "Worldwide",
"title": "Countries/areas deployed"
},
{
"category": "other",
"text": "Germany",
"title": "Company headquarters location"
},
{
"category": "general",
"text": "CISA recommends users take defensive measures to minimize the exploitation risk of this vulnerability.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the internet.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Locate control system networks and remote devices behind firewalls and isolate them from business networks.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most recent version available. Also recognize VPN is only as secure as its connected devices.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.",
"title": "Recommended Practices"
}
],
"publisher": {
"category": "other",
"contact_details": "central@cisa.dhs.gov",
"name": "CISA",
"namespace": "https://www.cisa.gov/"
},
"references": [
{
"category": "self",
"summary": "SSA-613116: Multiple Vulnerabilities in Third-Party Components in SINEC OS before V3.1 - CSAF Version",
"url": "https://cert-portal.siemens.com/productcert/csaf/ssa-613116.json"
},
{
"category": "self",
"summary": "SSA-613116: Multiple Vulnerabilities in Third-Party Components in SINEC OS before V3.1 - HTML Version",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-613116.html"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-25-226-15 JSON",
"url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2025/icsa-25-226-15.json"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-25-226-15 - Web Version",
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-226-15"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/topics/industrial-control-systems"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B"
}
],
"title": "Siemens SINEC OS",
"tracking": {
"current_release_date": "2025-08-12T00:00:00.000000Z",
"generator": {
"date": "2025-08-14T20:56:37.978177Z",
"engine": {
"name": "CISA CSAF Generator",
"version": "1.0.0"
}
},
"id": "ICSA-25-226-15",
"initial_release_date": "2025-08-12T00:00:00.000000Z",
"revision_history": [
{
"date": "2025-08-12T00:00:00.000000Z",
"legacy_version": "1.0",
"number": "1",
"summary": "Publication Date"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c3.1",
"product": {
"name": "RUGGEDCOM RST2428P (6GK6242-6PA00)",
"product_id": "CSAFPID-0001",
"product_identification_helper": {
"model_numbers": [
"6GK6242-6PA00"
]
}
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RST2428P (6GK6242-6PA00)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c3.1",
"product": {
"name": "SCALANCE XC-300/XR-300/XC-400/XR-500WG/XR-500 family",
"product_id": "CSAFPID-0002"
}
}
],
"category": "product_name",
"name": "SCALANCE XC-300/XR-300/XC-400/XR-500WG/XR-500 family"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c3.1",
"product": {
"name": "SCALANCE XCM-/XRM-/XCH-/XRH-300 family",
"product_id": "CSAFPID-0003"
}
}
],
"category": "product_name",
"name": "SCALANCE XCM-/XRM-/XCH-/XRH-300 family"
}
],
"category": "vendor",
"name": "Siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-44879",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In gc_data_segment in fs/f2fs/gc.c in the Linux kernel before 5.16.3, special files are not considered, leading to a move_data_page NULL pointer dereference.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2021-44879"
},
{
"cve": "CVE-2022-48935",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnetfilter: nf_tables: unregister flowtable hooks on netns exit",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2022-48935"
},
{
"cve": "CVE-2023-3567",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free flaw was found in vcs_read in drivers/tty/vt/vc_screen.c in vc_screen in the Linux Kernel. This issue may allow an attacker with local user access to cause a system crash or leak internal kernel information.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2023-3567"
},
{
"cve": "CVE-2023-5178",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free vulnerability was found in drivers/nvme/target/tcp.c` in `nvmet_tcp_free_crypto` due to a logical bug in the NVMe-oF/TCP subsystem in the Linux kernel. This issue may allow a malicious local privileged user to cause a use-after-free and double-free problem, which may permit remote code execution or lead to local privilege escalation problem.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2023-5178"
},
{
"cve": "CVE-2023-5678",
"cwe": {
"id": "CWE-606",
"name": "Unchecked Input for Loop Condition"
},
"notes": [
{
"category": "summary",
"text": "Issue summary: Generating excessively long X9.42 DH keys or checking excessively long X9.42 DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_generate_key() to generate an X9.42 DH key may experience long delays. Likewise, applications that use DH_check_pub_key(), DH_check_pub_key_ex() or EVP_PKEY_public_check() to check an X9.42 DH key or X9.42 DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. While DH_check() performs all the necessary checks (as of CVE-2023-3817), DH_check_pub_key() doesn\u0027t make any of these checks, and is therefore vulnerable for excessively large P and Q parameters. Likewise, while DH_generate_key() performs a check for an excessively large P, it doesn\u0027t check for an excessively large Q. An application that calls DH_generate_key() or DH_check_pub_key() and supplies a key or parameters obtained from an untrusted source could be vulnerable to a Denial of Service attack. DH_generate_key() and DH_check_pub_key() are also called by a number of other OpenSSL functions. An application calling any of those other functions may similarly be affected. The other functions affected by this are DH_check_pub_key_ex(), EVP_PKEY_public_check(), and EVP_PKEY_generate(). Also vulnerable are the OpenSSL pkey command line application when using the \"-pubcheck\" option, as well as the OpenSSL genpkey command line application. The OpenSSL SSL/TLS implementation is not affected by this issue. The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2023-5678"
},
{
"cve": "CVE-2023-5717",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "A heap out-of-bounds write vulnerability in the Linux kernel\u0027s Linux Kernel Performance Events (perf) component can be exploited to achieve local privilege escalation.\r\n\r\nIf perf_read_group() is called while an event\u0027s sibling_list is smaller than its child\u0027s sibling_list, it can increment or write to memory locations outside of the allocated buffer.\r\n\r\nWe recommend upgrading past commit 32671e3799ca2e4590773fd0e63aaa4229e50c06.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2023-5717"
},
{
"cve": "CVE-2023-6040",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "An out-of-bounds access vulnerability involving netfilter was reported and fixed as: f1082dd31fe4 (netfilter: nf_tables: Reject tables of unsupported family); While creating a new netfilter table, lack of a safeguard against invalid nf_tables family (pf) values within `nf_tables_newtable` function enables an attacker to achieve out-of-bounds access.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2023-6040"
},
{
"cve": "CVE-2023-6121",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "An out-of-bounds read vulnerability was found in the NVMe-oF/TCP subsystem in the Linux kernel. This issue may allow a remote attacker to send a crafted TCP packet, triggering a heap-based buffer overflow that results in kmalloc data being printed and potentially leaked to the kernel ring buffer (dmesg).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2023-6121"
},
{
"cve": "CVE-2023-6606",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "An out-of-bounds read vulnerability was found in smbCalcSize in fs/smb/client/netmisc.c in the Linux Kernel. This issue could allow a local attacker to crash the system or leak internal kernel information.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2023-6606"
},
{
"cve": "CVE-2023-6931",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "A heap out-of-bounds write vulnerability in the Linux kernel\u0027s Performance Events system component can be exploited to achieve local privilege escalation.\n\nA perf_event\u0027s read_size can overflow, leading to an heap out-of-bounds increment or write in perf_read_group().\n\nWe recommend upgrading past commit 382c27f4ed28f803b1f1473ac2d8db0afc795a1b.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2023-6931"
},
{
"cve": "CVE-2023-6932",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free vulnerability in the Linux kernel\u0027s ipv4: igmp component can be exploited to achieve local privilege escalation.\n\nA race condition can be exploited to cause a timer be mistakenly registered on a RCU read locked object which is freed by another thread.\n\nWe recommend upgrading past commit e2b706c691905fe78468c361aaabc719d0a496f1.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2023-6932"
},
{
"cve": "CVE-2023-35827",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in the Linux kernel through 6.3.8. A use-after-free was found in ravb_remove in drivers/net/ethernet/renesas/ravb_main.c.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2023-35827"
},
{
"cve": "CVE-2023-39198",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A race condition was found in the QXL driver in the Linux kernel. The qxl_mode_dumb_create() function dereferences the qobj returned by the qxl_gem_object_create_with_handle(), but the handle is the only one holding a reference to it. This flaw allows an attacker to guess the returned handle value and trigger a use-after-free issue, potentially leading to a denial of service or privilege escalation.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2023-39198"
},
{
"cve": "CVE-2023-45863",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in lib/kobject.c in the Linux kernel before 6.2.3. With root access, an attacker can trigger a race condition that results in a fill_kobj_path out-of-bounds write.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2023-45863"
},
{
"cve": "CVE-2023-46343",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel before 6.5.9, there is a NULL pointer dereference in send_acknowledge in net/nfc/nci/spi.c.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2023-46343"
},
{
"cve": "CVE-2023-51779",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "bt_sock_recvmsg in net/bluetooth/af_bluetooth.c in the Linux kernel through 6.6.8 has a use-after-free because of a bt_sock_ioctl race condition.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2023-51779"
},
{
"cve": "CVE-2023-51780",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in the Linux kernel before 6.6.8. do_vcc_ioctl in net/atm/ioctl.c has a use-after-free because of a vcc_recvmsg race condition.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2023-51780"
},
{
"cve": "CVE-2023-51781",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in the Linux kernel before 6.6.8. atalk_ioctl in net/appletalk/ddp.c has a use-after-free because of an atalk_recvmsg race condition.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2023-51781"
},
{
"cve": "CVE-2023-51782",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in the Linux kernel before 6.6.8. rose_ioctl in net/rose/af_rose.c has a use-after-free because of a rose_accept race condition.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2023-51782"
},
{
"cve": "CVE-2023-52340",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "summary",
"text": "The IPv6 implementation in the Linux kernel before 6.3 has a net/ipv6/route.c max_size threshold that can be consumed easily, e.g., leading to a denial of service (network is unreachable errors) when IPv6 packets are sent in a loop via a raw socket.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2023-52340"
},
{
"cve": "CVE-2023-52433",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnetfilter: nft_set_rbtree: skip sync GC for new elements in this transaction",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2023-52433"
},
{
"cve": "CVE-2023-52435",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnet: prevent mss overflow in skb_segment()",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2023-52435"
},
{
"cve": "CVE-2023-52475",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nInput: powermate - fix use-after-free in powermate_config_complete",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2023-52475"
},
{
"cve": "CVE-2023-52477",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nusb: hub: Guard against accesses to uninitialized BOS descriptors",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2023-52477"
},
{
"cve": "CVE-2023-52478",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nHID: logitech-hidpp: Fix kernel crash on receiver USB disconnect",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.0,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2023-52478"
},
{
"cve": "CVE-2023-52486",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ndrm: Don\u0027t unref the same fb many times by mistake due to deadlock handling",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2023-52486"
},
{
"cve": "CVE-2023-52502",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnet: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn()",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2023-52502"
},
{
"cve": "CVE-2023-52504",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nx86/alternatives: Disable KASAN in apply_alternatives()",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.0,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2023-52504"
},
{
"cve": "CVE-2023-52507",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnfc: nci: assert requested protocol is valid",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2023-52507"
},
{
"cve": "CVE-2023-52509",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nravb: Fix use-after-free issue in ravb_tx_timeout_work()",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.0,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2023-52509"
},
{
"cve": "CVE-2023-52510",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nieee802154: ca8210: Fix a potential UAF in ca8210_probe",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.0,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2023-52510"
},
{
"cve": "CVE-2023-52581",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnetfilter: nf_tables: fix memleak when more than 255 elements expired",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2023-52581"
},
{
"cve": "CVE-2023-52583",
"cwe": {
"id": "CWE-833",
"name": "Deadlock"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nceph: fix deadlock or deadcode of misusing dget()",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2023-52583"
},
{
"cve": "CVE-2023-52587",
"cwe": {
"id": "CWE-413",
"name": "Improper Resource Locking"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nIB/ipoib: Fix mcast list locking",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.0,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2023-52587"
},
{
"cve": "CVE-2023-52594",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nwifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus()",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2023-52594"
},
{
"cve": "CVE-2023-52595",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nwifi: rt2x00: restart beacon queue when hardware reset",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2023-52595"
},
{
"cve": "CVE-2023-52597",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nKVM: s390: fix setting of fpc register",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2023-52597"
},
{
"cve": "CVE-2023-52598",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ns390/ptrace: handle setting of fpc register correctly",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.0,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2023-52598"
},
{
"cve": "CVE-2023-52599",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\njfs: fix array-index-out-of-bounds in diNewExt",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2023-52599"
},
{
"cve": "CVE-2023-52600",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\njfs: fix uaf in jfs_evict_inode",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2023-52600"
},
{
"cve": "CVE-2023-52601",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\njfs: fix array-index-out-of-bounds in dbAdjTree",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2023-52601"
},
{
"cve": "CVE-2023-52602",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\njfs: fix slab-out-of-bounds Read in dtSearch",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2023-52602"
},
{
"cve": "CVE-2023-52603",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nUBSAN: array-index-out-of-bounds in dtSplitRoot",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2023-52603"
},
{
"cve": "CVE-2023-52604",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nFS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2023-52604"
},
{
"cve": "CVE-2023-52606",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\npowerpc/lib: Validate size for vector operations",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2023-52606"
},
{
"cve": "CVE-2023-52607",
"cwe": {
"id": "CWE-395",
"name": "Use of NullPointerException Catch to Detect NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\npowerpc/mm: Fix null-pointer dereference in pgtable_cache_add",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2023-52607"
},
{
"cve": "CVE-2023-52615",
"cwe": {
"id": "CWE-833",
"name": "Deadlock"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nhwrng: core - Fix page fault dead lock on mmap-ed hwrng",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2023-52615"
},
{
"cve": "CVE-2023-52617",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nPCI: switchtec: Fix stdev_release() crash after surprise hot remove",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2023-52617"
},
{
"cve": "CVE-2023-52619",
"cwe": {
"id": "CWE-99",
"name": "Improper Control of Resource Identifiers (\u0027Resource Injection\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\npstore/ram: Fix crash when setting number of cpus to an odd number",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2023-52619"
},
{
"cve": "CVE-2023-52622",
"cwe": {
"id": "CWE-131",
"name": "Incorrect Calculation of Buffer Size"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: ext4: avoid online resizing failures due to oversized flex bg.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2023-52622"
},
{
"cve": "CVE-2023-52623",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nSUNRPC: Fix a suspicious RCU usage warning",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2023-52623"
},
{
"cve": "CVE-2023-52637",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ncan: j1939: Fix UAF in j1939_sk_match_filter during setsockopt(SO_J1939_FILTER)",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2023-52637"
},
{
"cve": "CVE-2023-52654",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nio_uring/af_unix: disable sending io_uring over sockets",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2023-52654"
},
{
"cve": "CVE-2023-52655",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nusb: aqc111: check packet for fixup for true limit",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2023-52655"
},
{
"cve": "CVE-2023-52670",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nrpmsg: virtio: Free driver_override when rpmsg_remove()",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2023-52670"
},
{
"cve": "CVE-2023-52753",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ndrm/amd/display: Avoid NULL dereference of timing generator",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2023-52753"
},
{
"cve": "CVE-2023-52764",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nmedia: gspca: cpia1: shift-out-of-bounds in set_flicker",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2023-52764"
},
{
"cve": "CVE-2023-52774",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ns390/dasd: protect device queue against concurrent access",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2023-52774"
},
{
"cve": "CVE-2023-52784",
"cwe": {
"id": "CWE-99",
"name": "Improper Control of Resource Identifiers (\u0027Resource Injection\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nbonding: stop the device in bond_setup_by_slave()",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2023-52784"
},
{
"cve": "CVE-2023-52789",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ntty: vcc: Add check for kstrdup() in vcc_probe()",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2023-52789"
},
{
"cve": "CVE-2023-52791",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ni2c: core: Run atomic i2c xfer when !preemptible",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2023-52791"
},
{
"cve": "CVE-2023-52796",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nipvlan: add ipvlan_route_v6_outbound() helper",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2023-52796"
},
{
"cve": "CVE-2023-52799",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\njfs: fix array-index-out-of-bounds in dbFindLeaf",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2023-52799"
},
{
"cve": "CVE-2023-52804",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nfs/jfs: Add validity check for db_maxag and db_agpref",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2023-52804"
},
{
"cve": "CVE-2023-52805",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\njfs: fix array-index-out-of-bounds in diAlloc",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2023-52805"
},
{
"cve": "CVE-2023-52806",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nALSA: hda: Fix possible null-ptr-deref when assigning a stream",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2023-52806"
},
{
"cve": "CVE-2023-52809",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nscsi: libfc: Fix potential NULL pointer dereference in fc_lport_ptp_setup()",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2023-52809"
},
{
"cve": "CVE-2023-52810",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nfs/jfs: Add check for negative db_l2nbperpage",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2023-52810"
},
{
"cve": "CVE-2023-52813",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ncrypto: pcrypt - Fix hungtask for PADATA_RESET",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2023-52813"
},
{
"cve": "CVE-2023-52817",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ndrm/amdgpu: Fix a null pointer access when the smc_rreg pointer is NULL",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2023-52817"
},
{
"cve": "CVE-2023-52818",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ndrm/amd: Fix UBSAN array-index-out-of-bounds for SMU7",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2023-52818"
},
{
"cve": "CVE-2023-52819",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ndrm/amd: Fix UBSAN array-index-out-of-bounds for Polaris and Tonga",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2023-52819"
},
{
"cve": "CVE-2023-52832",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nwifi: mac80211: don\u0027t return unset power in ieee80211_get_tx_power()",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2023-52832"
},
{
"cve": "CVE-2023-52835",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nperf/core: Bail out early if the request AUX area is out of bound",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2023-52835"
},
{
"cve": "CVE-2023-52836",
"cwe": {
"id": "CWE-99",
"name": "Improper Control of Resource Identifiers (\u0027Resource Injection\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nlocking/ww_mutex/test: Fix potential workqueue corruption",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2023-52836"
},
{
"cve": "CVE-2023-52838",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nfbdev: imsttfb: fix a resource leak in probe",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2023-52838"
},
{
"cve": "CVE-2023-52840",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nInput: synaptics-rmi4 - fix use after free in rmi_unregister_function()",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2023-52840"
},
{
"cve": "CVE-2023-52843",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nllc: verify mac len before reading mac header",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2023-52843"
},
{
"cve": "CVE-2023-52845",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ntipc: Change nla_policy for bearer-related names to NLA_NUL_STRING",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2023-52845"
},
{
"cve": "CVE-2023-52847",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nmedia: bttv: fix use after free error due to btv-\u003etimeout timer",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2023-52847"
},
{
"cve": "CVE-2023-52853",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nhid: cp2112: Fix duplicate workqueue initialization",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2023-52853"
},
{
"cve": "CVE-2023-52855",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nusb: dwc2: fix possible NULL pointer dereference caused by driver concurrency",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2023-52855"
},
{
"cve": "CVE-2023-52858",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nclk: mediatek: clk-mt7629: Add check for mtk_alloc_clk_data",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2023-52858"
},
{
"cve": "CVE-2023-52864",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nplatform/x86: wmi: Fix opening of char device",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2023-52864"
},
{
"cve": "CVE-2023-52865",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nclk: mediatek: clk-mt6797: Add check for mtk_alloc_clk_data",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2023-52865"
},
{
"cve": "CVE-2023-52867",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ndrm/radeon: possible buffer overflow",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2023-52867"
},
{
"cve": "CVE-2023-52868",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nthermal: core: prevent potential string overflow",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2023-52868"
},
{
"cve": "CVE-2023-52871",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nsoc: qcom: llcc: Handle a second device without data corruption",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2023-52871"
},
{
"cve": "CVE-2023-52873",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nclk: mediatek: clk-mt6779: Add check for mtk_alloc_clk_data",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2023-52873"
},
{
"cve": "CVE-2023-52875",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nclk: mediatek: clk-mt2701: Add check for mtk_alloc_clk_data",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2023-52875"
},
{
"cve": "CVE-2023-52876",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nclk: mediatek: clk-mt7629-eth: Add check for mtk_alloc_clk_data",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2023-52876"
},
{
"cve": "CVE-2023-52879",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ntracing: Have trace_event_file have ref counters",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2023-52879"
},
{
"cve": "CVE-2023-52881",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ntcp: do not accept ACK of bytes we never sent",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2023-52881"
},
{
"cve": "CVE-2023-52919",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnfc: nci: fix possible NULL pointer dereference in send_acknowledge()",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2023-52919"
},
{
"cve": "CVE-2024-0193",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free flaw was found in the netfilter subsystem of the Linux kernel. If the catchall element is garbage-collected when the pipapo set is removed, the element can be deactivated twice. This can cause a use-after-free issue on an NFT_CHAIN object or NFT_OBJECT object, allowing a local unprivileged user with CAP_NET_ADMIN capability to escalate their privileges on the system.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2024-0193"
},
{
"cve": "CVE-2024-0584",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free issue was found in igmp_start_timer in net/ipv4/igmp.c in the network sub-component in the Linux Kernel. This flaw allows a local user to observe a refcnt use-after-free issue when receiving an igmp query packet, leading to a kernel information leak.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2024-0584"
},
{
"cve": "CVE-2024-0646",
"cwe": {
"id": "CWE-1314",
"name": "Missing Write Protection for Parametric Data Values"
},
"notes": [
{
"category": "summary",
"text": "An out-of-bounds memory write flaw was found in the Linux kernel\u2019s Transport Layer Security functionality in how a user calls a function splice with a ktls socket as the destination. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2024-0646"
},
{
"cve": "CVE-2024-0841",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "A null pointer dereference flaw was found in the hugetlbfs_fill_super function in the Linux kernel hugetlbfs (HugeTLB pages) functionality. This issue may allow a local user to crash the system or potentially escalate their privileges on the system.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2024-0841"
},
{
"cve": "CVE-2024-1086",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free vulnerability in the Linux kernel\u0027s netfilter: nf_tables component can be exploited to achieve local privilege escalation.\r\n\r\nThe nft_verdict_init() function allows positive values as drop error within the hook verdict, and hence the nf_hook_slow() function can cause a double free vulnerability when NF_DROP is issued with a drop error which resembles NF_ACCEPT.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2024-1086"
},
{
"cve": "CVE-2024-26581",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnetfilter: nft_set_rbtree: skip end interval element from gc",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2024-26581"
},
{
"cve": "CVE-2024-26593",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ni2c: i801: Fix block process call transactions",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2024-26593"
},
{
"cve": "CVE-2024-26598",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nKVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2024-26598"
},
{
"cve": "CVE-2024-26600",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nphy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2024-26600"
},
{
"cve": "CVE-2024-26602",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nsched/membarrier: reduce the ability to hammer on sys_membarrier",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2024-26602"
},
{
"cve": "CVE-2024-26606",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nbinder: signal epoll threads of self-work",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2024-26606"
},
{
"cve": "CVE-2024-26615",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnet/smc: fix illegal rmb_desc access in SMC-D connection dump",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2024-26615"
},
{
"cve": "CVE-2024-26625",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nllc: call sock_orphan() at release time",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2024-26625"
},
{
"cve": "CVE-2024-26635",
"cwe": {
"id": "CWE-456",
"name": "Missing Initialization of a Variable"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nllc: Drop support for ETH_P_TR_802_2.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2024-26635"
},
{
"cve": "CVE-2024-26636",
"cwe": {
"id": "CWE-413",
"name": "Improper Resource Locking"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nllc: make llc_ui_sendmsg() more robust against bonding changes",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2024-26636"
},
{
"cve": "CVE-2024-26645",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: tracing: Ensure visibility when inserting an element into tracing_map.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2024-26645"
},
{
"cve": "CVE-2024-26663",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ntipc: Check the bearer type before calling tipc_udp_nl_bearer_add()",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2024-26663"
},
{
"cve": "CVE-2024-26664",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nhwmon: (coretemp) Fix out-of-bounds memory access",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2024-26664"
},
{
"cve": "CVE-2024-26671",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: blk-mq: fix IO hang from sbitmap wakeup race.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2024-26671"
},
{
"cve": "CVE-2024-26673",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnetfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2024-26673"
},
{
"cve": "CVE-2024-26675",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nppp_async: limit MRU to 64K",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2024-26675"
},
{
"cve": "CVE-2024-26679",
"cwe": {
"id": "CWE-413",
"name": "Improper Resource Locking"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ninet: read sk-\u003esk_family once in inet_recv_error()",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2024-26679"
},
{
"cve": "CVE-2024-26684",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnet: stmmac: xgmac: fix handling of DPP safety error for DMA channels",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2024-26684"
},
{
"cve": "CVE-2024-26685",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnilfs2: fix potential bug in end_buffer_async_write",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2024-26685"
},
{
"cve": "CVE-2024-26688",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nfs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2024-26688"
},
{
"cve": "CVE-2024-26696",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnilfs2: fix hang in nilfs_lookup_dirty_data_buffers()",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2024-26696"
},
{
"cve": "CVE-2024-26697",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnilfs2: fix data corruption in dsync block recovery for small block sizes",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2024-26697"
},
{
"cve": "CVE-2024-26702",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\niio: magnetometer: rm3100: add boundary check for the value read from RM3100_REG_TMRC",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2024-26702"
},
{
"cve": "CVE-2024-26704",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\next4: fix double-free of blocks due to wrong extents moved_len",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2024-26704"
},
{
"cve": "CVE-2024-26720",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nmm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2024-26720"
},
{
"cve": "CVE-2024-26722",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nASoC: rt5645: Fix deadlock in rt5645_jack_detect_work()",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2024-26722"
},
{
"cve": "CVE-2024-26735",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nipv6: sr: fix possible use-after-free and null-ptr-deref",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2024-26735"
},
{
"cve": "CVE-2024-26736",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nafs: Increase buffer size in afs_update_volume_status()",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2024-26736"
},
{
"cve": "CVE-2024-26748",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nusb: cdns3: fix memory double free when handle zero packet",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2024-26748"
},
{
"cve": "CVE-2024-26749",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nusb: cdns3: fixed memory use after free at cdns3_gadget_ep_disable()",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2024-26749"
},
{
"cve": "CVE-2024-26751",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nARM: ep93xx: Add terminator to gpiod_lookup_table",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2024-26751"
},
{
"cve": "CVE-2024-26752",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nl2tp: pass correct message length to ip6_append_data",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2024-26752"
},
{
"cve": "CVE-2024-26754",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ngtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp()",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2024-26754"
},
{
"cve": "CVE-2024-26763",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ndm-crypt: don\u0027t modify the data when using authenticated encryption",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2024-26763"
},
{
"cve": "CVE-2024-26764",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nfs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2024-26764"
},
{
"cve": "CVE-2024-26766",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nIB/hfi1: Fix sdma.h tx-\u003enum_descs off-by-one error",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2024-26766"
},
{
"cve": "CVE-2024-26772",
"cwe": {
"id": "CWE-413",
"name": "Improper Resource Locking"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\next4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal()\r\n\r\nPlaces the logic for checking if the group\u0027s block bitmap is corrupt under\r\nthe protection of the group lock to avoid allocating blocks from the group\r\nwith a corrupted block bitmap.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2024-26772"
},
{
"cve": "CVE-2024-26773",
"cwe": {
"id": "CWE-413",
"name": "Improper Resource Locking"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2024-26773"
},
{
"cve": "CVE-2024-26777",
"cwe": {
"id": "CWE-369",
"name": "Divide By Zero"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nfbdev: sis: Error out if pixclock equals zero",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2024-26777"
},
{
"cve": "CVE-2024-26778",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nfbdev: savage: Error out if pixclock equals zero",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2024-26778"
},
{
"cve": "CVE-2024-26779",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nwifi: mac80211: fix race condition on enabling fast-xmit",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2024-26779"
},
{
"cve": "CVE-2024-26788",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ndmaengine: fsl-qdma: init irq after reg initialization",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2024-26788"
},
{
"cve": "CVE-2024-26790",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ndmaengine: fsl-qdma: fix SoC may hang on 16 byte unaligned read",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2024-26790"
},
{
"cve": "CVE-2024-26791",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nbtrfs: dev-replace: properly validate device names",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2024-26791"
},
{
"cve": "CVE-2024-26793",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ngtp: fix use-after-free and null-ptr-deref in gtp_newlink()",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2024-26793"
},
{
"cve": "CVE-2024-26801",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nBluetooth: Avoid potential use-after-free in hci_error_reset",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2024-26801"
},
{
"cve": "CVE-2024-26804",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnet: ip_tunnel: prevent perpetual headroom growth",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2024-26804"
},
{
"cve": "CVE-2024-26805",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: netlink: Fix kernel-infoleak-after-free in skb_datagram_iter.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2024-26805"
},
{
"cve": "CVE-2024-26825",
"cwe": {
"id": "CWE-402",
"name": "Transmission of Private Resources into a New Sphere (\u0027Resource Leak\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnfc: nci: free rx_data_reassembly skb on NCI device cleanup",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2024-26825"
},
{
"cve": "CVE-2024-26835",
"cwe": {
"id": "CWE-459",
"name": "Incomplete Cleanup"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnetfilter: nf_tables: set dormant flag on hook register failure",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2024-26835"
},
{
"cve": "CVE-2024-26839",
"cwe": {
"id": "CWE-402",
"name": "Transmission of Private Resources into a New Sphere (\u0027Resource Leak\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nIB/hfi1: Fix a memleak in init_credit_return",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2024-26839"
},
{
"cve": "CVE-2024-26840",
"cwe": {
"id": "CWE-402",
"name": "Transmission of Private Resources into a New Sphere (\u0027Resource Leak\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ncachefiles: fix memory leak in cachefiles_add_cache()",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2024-26840"
},
{
"cve": "CVE-2024-26845",
"cwe": {
"id": "CWE-99",
"name": "Improper Control of Resource Identifiers (\u0027Resource Injection\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nscsi: target: core: Add TMF to tmr_list handling",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2024-26845"
},
{
"cve": "CVE-2024-26910",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnetfilter: ipset: fix performance regression in swap operation",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2024-26910"
},
{
"cve": "CVE-2024-27405",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nusb: gadget: ncm: Avoid dropping datagrams of properly parsed NTBs",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2024-27405"
},
{
"cve": "CVE-2024-27410",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nwifi: nl80211: reject iftype change with mesh ID change",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2024-27410"
},
{
"cve": "CVE-2024-27412",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\npower: supply: bq27xxx-i2c: Do not free non existing IRQ",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2024-27412"
},
{
"cve": "CVE-2024-27413",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nefi/capsule-loader: fix incorrect allocation size",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2024-27413"
},
{
"cve": "CVE-2024-27414",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nrtnetlink: fix error logic of IFLA_BRIDGE_FLAGS writing back",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2024-27414"
},
{
"cve": "CVE-2024-27416",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nBluetooth: hci_event: Fix handling of HCI_EV_IO_CAPA_REQUEST",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2024-27416"
},
{
"cve": "CVE-2024-27417",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nipv6: fix potential \"struct net\" leak in inet6_rtm_getaddr()",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2024-27417"
},
{
"cve": "CVE-2024-35833",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ndmaengine: fsl-qdma: Fix a memory leak related to the queue command DMA",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2024-35833"
},
{
"cve": "CVE-2024-35835",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnet/mlx5e: fix a double-free in arfs_create_groups",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2024-35835"
},
{
"cve": "CVE-2024-39476",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nmd/raid5: fix deadlock that raid5d() wait for itself to clear MD_SB_CHANGE_PENDING",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2024-39476"
}
]
}
FKIE_CVE-2024-26598
Vulnerability from fkie_nvd - Published: 2024-02-23 15:15 - Updated: 2024-11-21 09:027.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
| URL | Tags | ||
|---|---|---|---|
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/12c2759ab1343c124ed46ba48f27bd1ef5d2dff4 | Patch | |
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/65b201bf3e9af1b0254243a5881390eda56f72d1 | Patch | |
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/ad362fe07fecf0aba839ff2cc59a3617bd42c33f | Patch | |
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/ba7be666740847d967822bed15500656b26bc703 | Patch | |
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/d04acadb6490aa3314f9c9e087691e55de153b88 | Patch | |
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/dba788e25f05209adf2b0175eb1691dc89fb1ba6 | Patch | |
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/dd3956a1b3dd11f46488c928cb890d6937d1ca80 | Patch | |
| af854a3a-2127-422b-91ae-364da2661108 | https://git.kernel.org/stable/c/12c2759ab1343c124ed46ba48f27bd1ef5d2dff4 | Patch | |
| af854a3a-2127-422b-91ae-364da2661108 | https://git.kernel.org/stable/c/65b201bf3e9af1b0254243a5881390eda56f72d1 | Patch | |
| af854a3a-2127-422b-91ae-364da2661108 | https://git.kernel.org/stable/c/ad362fe07fecf0aba839ff2cc59a3617bd42c33f | Patch | |
| af854a3a-2127-422b-91ae-364da2661108 | https://git.kernel.org/stable/c/ba7be666740847d967822bed15500656b26bc703 | Patch | |
| af854a3a-2127-422b-91ae-364da2661108 | https://git.kernel.org/stable/c/d04acadb6490aa3314f9c9e087691e55de153b88 | Patch | |
| af854a3a-2127-422b-91ae-364da2661108 | https://git.kernel.org/stable/c/dba788e25f05209adf2b0175eb1691dc89fb1ba6 | Patch | |
| af854a3a-2127-422b-91ae-364da2661108 | https://git.kernel.org/stable/c/dd3956a1b3dd11f46488c928cb890d6937d1ca80 | Patch | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html |
| Vendor | Product | Version | |
|---|---|---|---|
| linux | linux_kernel | * | |
| linux | linux_kernel | * | |
| linux | linux_kernel | * | |
| linux | linux_kernel | * | |
| linux | linux_kernel | * | |
| linux | linux_kernel | * | |
| debian | debian_linux | 10.0 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E2B90340-A8CC-4956-9F40-F37195011EC7",
"versionEndExcluding": "5.4.269",
"versionStartIncluding": "5.4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "74979A03-4B10-4815-AE3E-C8C0D2FDAA39",
"versionEndExcluding": "5.10.209",
"versionStartIncluding": "5.5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2ED0CDB9-61B0-408E-B2A8-5199107F7868",
"versionEndExcluding": "5.15.148",
"versionStartIncluding": "5.11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "070D0ED3-90D0-4F95-B1FF-57D7F46F332D",
"versionEndExcluding": "6.1.75",
"versionStartIncluding": "5.16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5C6B50A6-3D8B-4CE2-BDCC-A098609CBA14",
"versionEndExcluding": "6.6.14",
"versionStartIncluding": "6.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7229C448-E0C9-488B-8939-36BA5254065E",
"versionEndExcluding": "6.7.2",
"versionStartIncluding": "6.7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache\n\nThere is a potential UAF scenario in the case of an LPI translation\ncache hit racing with an operation that invalidates the cache, such\nas a DISCARD ITS command. The root of the problem is that\nvgic_its_check_cache() does not elevate the refcount on the vgic_irq\nbefore dropping the lock that serializes refcount changes.\n\nHave vgic_its_check_cache() raise the refcount on the returned vgic_irq\nand add the corresponding decrement after queueing the interrupt."
},
{
"lang": "es",
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: KVM: arm64: vgic-its: Evite posibles UAF en la cach\u00e9 de traducci\u00f3n LPI. Existe un escenario potencial de UAF en el caso de que un cach\u00e9 de traducci\u00f3n LPI se acelere con una operaci\u00f3n que invalide la cach\u00e9, como un comando DISCARD ITS. La ra\u00edz del problema es que vgic_its_check_cache() no eleva el refcount en vgic_irq antes de eliminar el bloqueo que serializa los cambios de refcount. Haga que vgic_its_check_cache() aumente el refcount en el vgic_irq devuelto y agregue el decremento correspondiente despu\u00e9s de poner en cola la interrupci\u00f3n."
}
],
"id": "CVE-2024-26598",
"lastModified": "2024-11-21T09:02:37.617",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2024-02-23T15:15:09.610",
"references": [
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/12c2759ab1343c124ed46ba48f27bd1ef5d2dff4"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/65b201bf3e9af1b0254243a5881390eda56f72d1"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/ad362fe07fecf0aba839ff2cc59a3617bd42c33f"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/ba7be666740847d967822bed15500656b26bc703"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/d04acadb6490aa3314f9c9e087691e55de153b88"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/dba788e25f05209adf2b0175eb1691dc89fb1ba6"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/dd3956a1b3dd11f46488c928cb890d6937d1ca80"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/12c2759ab1343c124ed46ba48f27bd1ef5d2dff4"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/65b201bf3e9af1b0254243a5881390eda56f72d1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/ad362fe07fecf0aba839ff2cc59a3617bd42c33f"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/ba7be666740847d967822bed15500656b26bc703"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/d04acadb6490aa3314f9c9e087691e55de153b88"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/dba788e25f05209adf2b0175eb1691dc89fb1ba6"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/dd3956a1b3dd11f46488c928cb890d6937d1ca80"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html"
}
],
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-416"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-416"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
GSD-2024-26598
Vulnerability from gsd - Updated: 2024-02-20 06:02{
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2024-26598"
],
"details": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache\n\nThere is a potential UAF scenario in the case of an LPI translation\ncache hit racing with an operation that invalidates the cache, such\nas a DISCARD ITS command. The root of the problem is that\nvgic_its_check_cache() does not elevate the refcount on the vgic_irq\nbefore dropping the lock that serializes refcount changes.\n\nHave vgic_its_check_cache() raise the refcount on the returned vgic_irq\nand add the corresponding decrement after queueing the interrupt.",
"id": "GSD-2024-26598",
"modified": "2024-02-20T06:02:29.177591Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@kernel.org",
"ID": "CVE-2024-26598",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Linux",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "1da177e4c3f4",
"version_value": "d04acadb6490"
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected",
"versions": [
{
"lessThanOrEqual": "5.4.*",
"status": "unaffected",
"version": "5.4.269",
"versionType": "custom"
},
{
"lessThanOrEqual": "5.10.*",
"status": "unaffected",
"version": "5.10.209",
"versionType": "custom"
},
{
"lessThanOrEqual": "5.15.*",
"status": "unaffected",
"version": "5.15.148",
"versionType": "custom"
},
{
"lessThanOrEqual": "6.1.*",
"status": "unaffected",
"version": "6.1.75",
"versionType": "custom"
},
{
"lessThanOrEqual": "6.6.*",
"status": "unaffected",
"version": "6.6.14",
"versionType": "custom"
},
{
"lessThanOrEqual": "6.7.*",
"status": "unaffected",
"version": "6.7.2",
"versionType": "custom"
},
{
"lessThanOrEqual": "*",
"status": "unaffected",
"version": "6.8",
"versionType": "original_commit_for_fix"
}
]
}
}
]
}
}
]
},
"vendor_name": "Linux"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache\n\nThere is a potential UAF scenario in the case of an LPI translation\ncache hit racing with an operation that invalidates the cache, such\nas a DISCARD ITS command. The root of the problem is that\nvgic_its_check_cache() does not elevate the refcount on the vgic_irq\nbefore dropping the lock that serializes refcount changes.\n\nHave vgic_its_check_cache() raise the refcount on the returned vgic_irq\nand add the corresponding decrement after queueing the interrupt."
}
]
},
"generator": {
"engine": "bippy-8df59b4913de"
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://git.kernel.org/stable/c/d04acadb6490aa3314f9c9e087691e55de153b88",
"refsource": "MISC",
"url": "https://git.kernel.org/stable/c/d04acadb6490aa3314f9c9e087691e55de153b88"
},
{
"name": "https://git.kernel.org/stable/c/ba7be666740847d967822bed15500656b26bc703",
"refsource": "MISC",
"url": "https://git.kernel.org/stable/c/ba7be666740847d967822bed15500656b26bc703"
},
{
"name": "https://git.kernel.org/stable/c/12c2759ab1343c124ed46ba48f27bd1ef5d2dff4",
"refsource": "MISC",
"url": "https://git.kernel.org/stable/c/12c2759ab1343c124ed46ba48f27bd1ef5d2dff4"
},
{
"name": "https://git.kernel.org/stable/c/dba788e25f05209adf2b0175eb1691dc89fb1ba6",
"refsource": "MISC",
"url": "https://git.kernel.org/stable/c/dba788e25f05209adf2b0175eb1691dc89fb1ba6"
},
{
"name": "https://git.kernel.org/stable/c/65b201bf3e9af1b0254243a5881390eda56f72d1",
"refsource": "MISC",
"url": "https://git.kernel.org/stable/c/65b201bf3e9af1b0254243a5881390eda56f72d1"
},
{
"name": "https://git.kernel.org/stable/c/dd3956a1b3dd11f46488c928cb890d6937d1ca80",
"refsource": "MISC",
"url": "https://git.kernel.org/stable/c/dd3956a1b3dd11f46488c928cb890d6937d1ca80"
},
{
"name": "https://git.kernel.org/stable/c/ad362fe07fecf0aba839ff2cc59a3617bd42c33f",
"refsource": "MISC",
"url": "https://git.kernel.org/stable/c/ad362fe07fecf0aba839ff2cc59a3617bd42c33f"
}
]
}
},
"nvd.nist.gov": {
"cve": {
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "48E561A5-2F59-4E74-BFAB-39B8D844FD15",
"versionEndExcluding": "5.4.269",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5D2E4F24-2FBB-4434-8598-2B1499E566B5",
"versionEndExcluding": "5.10.209",
"versionStartIncluding": "5.5.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E25E1389-4B0F-407A-9C94-5908FF3EE88B",
"versionEndExcluding": "5.15.148",
"versionStartIncluding": "5.11.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2C4951FA-80C0-4B4C-9836-6E5035DEB0F9",
"versionEndExcluding": "6.1.75",
"versionStartIncluding": "5.16.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BDBBEB0E-D13A-4567-8984-51C5375350B9",
"versionEndExcluding": "6.6.14",
"versionStartIncluding": "6.2.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0EA3778C-730B-464C-8023-18CA6AC0B807",
"versionEndExcluding": "6.7.2",
"versionStartIncluding": "6.7.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache\n\nThere is a potential UAF scenario in the case of an LPI translation\ncache hit racing with an operation that invalidates the cache, such\nas a DISCARD ITS command. The root of the problem is that\nvgic_its_check_cache() does not elevate the refcount on the vgic_irq\nbefore dropping the lock that serializes refcount changes.\n\nHave vgic_its_check_cache() raise the refcount on the returned vgic_irq\nand add the corresponding decrement after queueing the interrupt."
},
{
"lang": "es",
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: KVM: arm64: vgic-its: Evite posibles UAF en la cach\u00e9 de traducci\u00f3n LPI. Existe un escenario potencial de UAF en el caso de que un cach\u00e9 de traducci\u00f3n LPI se acelere con una operaci\u00f3n que invalide la cach\u00e9, como un comando DISCARD ITS. La ra\u00edz del problema es que vgic_its_check_cache() no eleva el refcount en vgic_irq antes de eliminar el bloqueo que serializa los cambios de refcount. Haga que vgic_its_check_cache() aumente el refcount en el vgic_irq devuelto y agregue el decremento correspondiente despu\u00e9s de poner en cola la interrupci\u00f3n."
}
],
"id": "CVE-2024-26598",
"lastModified": "2024-04-17T19:40:31.310",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2024-02-23T15:15:09.610",
"references": [
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/12c2759ab1343c124ed46ba48f27bd1ef5d2dff4"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/65b201bf3e9af1b0254243a5881390eda56f72d1"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/ad362fe07fecf0aba839ff2cc59a3617bd42c33f"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/ba7be666740847d967822bed15500656b26bc703"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/d04acadb6490aa3314f9c9e087691e55de153b88"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/dba788e25f05209adf2b0175eb1691dc89fb1ba6"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/dd3956a1b3dd11f46488c928cb890d6937d1ca80"
}
],
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-416"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
}
}
}
GHSA-XFVP-H462-P6Q2
Vulnerability from github – Published: 2024-02-23 15:30 – Updated: 2024-06-25 21:31In the Linux kernel, the following vulnerability has been resolved:
KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache
There is a potential UAF scenario in the case of an LPI translation cache hit racing with an operation that invalidates the cache, such as a DISCARD ITS command. The root of the problem is that vgic_its_check_cache() does not elevate the refcount on the vgic_irq before dropping the lock that serializes refcount changes.
Have vgic_its_check_cache() raise the refcount on the returned vgic_irq and add the corresponding decrement after queueing the interrupt.
{
"affected": [],
"aliases": [
"CVE-2024-26598"
],
"database_specific": {
"cwe_ids": [
"CWE-416"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2024-02-23T15:15:09Z",
"severity": "HIGH"
},
"details": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache\n\nThere is a potential UAF scenario in the case of an LPI translation\ncache hit racing with an operation that invalidates the cache, such\nas a DISCARD ITS command. The root of the problem is that\nvgic_its_check_cache() does not elevate the refcount on the vgic_irq\nbefore dropping the lock that serializes refcount changes.\n\nHave vgic_its_check_cache() raise the refcount on the returned vgic_irq\nand add the corresponding decrement after queueing the interrupt.",
"id": "GHSA-xfvp-h462-p6q2",
"modified": "2024-06-25T21:31:11Z",
"published": "2024-02-23T15:30:38Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26598"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/12c2759ab1343c124ed46ba48f27bd1ef5d2dff4"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/65b201bf3e9af1b0254243a5881390eda56f72d1"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/ad362fe07fecf0aba839ff2cc59a3617bd42c33f"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/ba7be666740847d967822bed15500656b26bc703"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/d04acadb6490aa3314f9c9e087691e55de153b88"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/dba788e25f05209adf2b0175eb1691dc89fb1ba6"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/dd3956a1b3dd11f46488c928cb890d6937d1ca80"
},
{
"type": "WEB",
"url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.